CHAPTER 8
Capturing Evidence
We’ll Cover
Creating a forensic image of a hard drive
Creating a forensic image of an external storage drive
Creating a forensic image of a network share
This chapter discusses how to capture evidence, in the form of a forensic image, from various sources. We will also discuss what you can and cannot recover from each source. Because you should always try to create a forensic image with a forensically sound ...
Get Computer Forensics InfoSec Pro Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.