ATTENTION: The new home of the Digital Forensics Wiki is at https://forensicswiki.xyz/. Yeah, it's a silly name, but it was cheap.
This wiki will be going offline permanently in the near future. An exact date will be announced soon. Thank you for being a part of this community.
If you wish to work on the new forensicswiki, please join the Google Group forensicswiki-reborn

Disk image

From ForensicsWiki
Revision as of 14:44, 16 July 2008 by Rgautier (Talk | contribs)

Jump to: navigation, search

A disk image is a full disk copy of the data making up the partition table, file allocation tables and data partitions without regard for operating system.

A disk image should be made prior to performing any forensic analysis of the disk. Creating a disk image is important in forensics for several reasons:

1. Ensure that disk information is not inadvertantly changed during analysis. 2. By performing an original disk image and storing the original disk, it is possible to reproduce forensic test results with an exact reproduction of analysis methods on the original evidence. 3. Disk imaging will capture information invisible to the operating system in use *E.g. hidden partitions, ext3 partitions on a Windows machine, etc.

Software Popular software used to create disk images includes Norton Ghost