Question: In this section we will hash the evidence files FTK Lite created. This will allow us to maintain the integrity and authenticity of the evidence
In this section we will hash the evidence files FTK Lite created. This will allow us to maintain the integrity and authenticity of the evidence when we need to pass the image to others for analysis.
As is protocol, verify the forensic image's integrity to make sure it was not tampered with prior to the analysis stages. Check the hash in Autopsy and compare it to the MD checksum automatically generated by FTK Imager Lite earlier.
After successfully ingesting the forensic image into Autopsy, familiarize yourself with the data collected and take notes in the text file created earlier. Specifically, note the volumes present, the "Extracted Content", and if there is anything suspiscious present in the WindowsSystem directory. Save the file when finished.
Begin your data extraction and recover everything from user's home folder by extracting the entire "user" folder into the E:imageinvestigationSuspectDriveExport directory. Then, extract the WindowsSystem folder as well.
Note: If done correctly, you will have a ####user folder and a ####System folder in the SuspectDriveExport directory.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
