All courses may now be found at SUMURI.COM. This course will remain live in UDEMY for existing students.
Welcome to the Surviving Digital Forensics series. This series is focused on helping you become a better computer forensic examiner by teaching core computer forensic skills - all in about one hour. In this class you will learn how to image a Mac using only a Mac and freely available software. This will give you not only an additional imaging option but also provide you a solution for imaging Mac Fusion drives.
As with previous SDF classes you will learn by doing. The class begins with a brief overview of the issue at hand. Then we set up our forensic systems and off we go. Learning is hands on and we will use low cost and no cost computer forensic tools to do so.
Expert and novice computer forensic examiners alike will gain from this class. Since we are doing it the SDF way we are going to teach you real computer forensic skills that you can apply using our method or customize to meet your needs. We cover basic imaging as well as some additional options you may need such as, splitting an image, using different hash algorithms, imaging partitions and more.
1. Introduction and Welcome to the SDF series
2. What this class is all about
3. How to get the most of this class
4. The problem and the solution
5. Getting your forensic system setup
6. Imaging steps download
7. Turning off Disk Arbitration
8. Identifying your evidence in Terminal
9. Imaging with DCFLDD
10. Lock your DMG file
11. DCFLDD breakdown
12. Getting the DCFLDD version
13. Using different hash algorithms
14. Splitting your image
15. Changing the image file extensions of your image segments
16. Imaging partitions
17. Imaging Mac Fusion drives
18. Mac imaging quiz
18. Thank you & final thoughts
A Mac running OS 10.9+ is required for this course. If you are running 10.7 or 10.8 you likely will be okay, but a more up-to-date platform is recommended. The forensic tools we use are all freely available, so beyond your operating system all you need is the desire to become a better computer forensic examiner.
Let's talk about what this class is all about and what you will get out of it.
Let's look at the issue at hand and how we are going to solve it.
In this lesson I will walk you through installing the freely available forensic tools we will be using.
How to mount your evidence storage disk after you turn Disk Arbitration off.
You may use Disk Arbitration as a software write block so long as you validate it! In this next section I go over the steps of turning off Disk Artbitration.
Since we are working in Terminal you need a way to identify your local disks from your evidence disks. This next sections walks you through the steps to do it.
Now let's get to it and create an image.
Remember to lock your DMG file to keep it in read only mode.
In this section I break down DCFLDD so you better understand the command. This comes in handy if you have to explain it.
Many examiners need to document the version of the tool they use. In this section I will show you how to identify the version of DCFLDD you are using.
MD5 is old fashion, let's adjust our command so we can hash using different algorithms and hash with multiple algorithms at once.
Next up is learning how to segment your image file. I will show you how to set it up and how to customize it.
In this module I will show you how to change the file extension of your segmented image file.
Sometimes you do not want to image the entire disk. Rather, you just need to image a certain partition on the disk. I show you how to do that next.
If you are imaging a Mac Fusion drive, or any Mac for that matter, an option is to place it into target disk mode and image it that way. In this section I will walk you through the steps.
This section teaches you how to image the pieces of a Mac Fusion drive and then reassemble them on a forensic Mac to be recombined into a new image file.
Thanks for joining me in another edition of the Surviving Digital Forensics series. I hope you enjoyed the class!
Check out other classes of the SDF series at http://sumuri.com/training/surviving-digital-forensics/
Follow me on Twitter @LeclairDF to get the latest happenings of the SDF series.
Check out our Blog at http://sumuri.com/about/news/
Check out our Youtube channel https://www.youtube.com/user/SumuriNews
Over twelve years of experience as a Computer Forensic Analyst, author and developer of computer forensic training and analysis tools. Specialties include: Windows forensics, Mac forensics, iOS forensics, Mac Server forensics & mobile device forensics. Creator of the "Surviving Digital Forensics" series and part of SUMURI's RECON for Mac OS X development team.
Certifications include: CFCE, CISSP, CCE, EnCE, A+, Network+
Regularly instruct law enforcement, government and corporate investigators both nationally and internationally in computer forensics.