From the course: Cybersecurity Foundations: Computer Forensics
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Mounting manually
From the course: Cybersecurity Foundations: Computer Forensics
Mounting manually
- [Instructor] A storage device connected to your computer is not mounted by default in a forensic copy of your Linux OS. When you're not dealing with an evidence drive and want to mount the drive, here is how you do it. First, identify the drive and the partition you want to mount. From our lesson earlier, we know the partition is /dev/sdb1. To mount it, first of all, we need to create a mount point. A mount point is a directory where you want to see the content of a drive. Let's create a new directory by typing mkdir and then the name of your mount point. And we'll call it usb_mounted. Press Enter. Type ls to see what's in the current directory. Press Enter. As you can see, now we have a new directory created, called usb_mounted. Let's see what's inside the newly created directory. Type cd and the name of the mount point, which is ./usb_mounted/. Press Enter. Type ls and press Enter. There is nothing in…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Evidence preservation approaches2m 53s
-
(Locked)
Understanding the role of write blockers1m 55s
-
(Locked)
Using a software write blocker3m 52s
-
(Locked)
Using hardware write blockers2m 40s
-
(Locked)
Understanding hashing1m 21s
-
(Locked)
Hashing algorithms1m 24s
-
(Locked)
Case Study: Hashing in FTK Imager3m 47s
-
(Locked)
Understanding mounting5m 42s
-
(Locked)
Mounting manually4m 6s
-
(Locked)
Challenge: Hashing in Kali1m 33s
-
(Locked)
Solution: Hashing in Kali1m 13s
-
(Locked)
-
-
-