From the course: Cybersecurity Foundations: Computer Forensics
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Case Study: Hashing in FTK Imager
From the course: Cybersecurity Foundations: Computer Forensics
Case Study: Hashing in FTK Imager
- [Instructor] Many of the computer forensics tools available today come equipped with built-in hash functions. The primary purpose of these built-in hash features is the verification and validation of your data you're working on in your computer forensics investigation. For example, there's a tool called FTK Imager and it comes with both MD5 and SHA hash algorithms. An alternative to using these built-in hash options is manually computing hash values. As we saw in another lesson, you can use a Linux hash algorithm implementation such as MD5 Sum. In this lesson, let's try the hash features of the FTK Imager. First choose file, click create disk image. We'll go for the default choice, physical drive, and click on next. From this list, choose your drive. I'm choosing the smallest drive just to make it quick. Click on finish. Now it's asking for image destinations. Let's click on add. Now we need to select the…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Evidence preservation approaches2m 53s
-
(Locked)
Understanding the role of write blockers1m 55s
-
(Locked)
Using a software write blocker3m 52s
-
(Locked)
Using hardware write blockers2m 40s
-
(Locked)
Understanding hashing1m 21s
-
(Locked)
Hashing algorithms1m 24s
-
(Locked)
Case Study: Hashing in FTK Imager3m 47s
-
(Locked)
Understanding mounting5m 42s
-
(Locked)
Mounting manually4m 6s
-
(Locked)
Challenge: Hashing in Kali1m 33s
-
(Locked)
Solution: Hashing in Kali1m 13s
-
(Locked)
-
-
-