From the course: Cybersecurity Foundations: Computer Forensics

Unlock the full course today

Join today to access over 25,200 courses taught by industry experts.

Case Study: Hashing in FTK Imager

Case Study: Hashing in FTK Imager

- [Instructor] Many of the computer forensics tools available today come equipped with built-in hash functions. The primary purpose of these built-in hash features is the verification and validation of your data you're working on in your computer forensics investigation. For example, there's a tool called FTK Imager and it comes with both MD5 and SHA hash algorithms. An alternative to using these built-in hash options is manually computing hash values. As we saw in another lesson, you can use a Linux hash algorithm implementation such as MD5 Sum. In this lesson, let's try the hash features of the FTK Imager. First choose file, click create disk image. We'll go for the default choice, physical drive, and click on next. From this list, choose your drive. I'm choosing the smallest drive just to make it quick. Click on finish. Now it's asking for image destinations. Let's click on add. Now we need to select the…

Contents