CHAPTER 8
Capturing Evidence
We’ll Cover
 
image   Creating a forensic image of a hard drive
image   Creating a forensic image of an external storage drive
image   Creating a forensic image of a network share
 
This chapter discusses how to capture evidence, in the form of a forensic image, from various sources. We will also discuss what you can and cannot recover from each source. Because you should always try to create a forensic image with a forensically sound ...

Get Computer Forensics InfoSec Pro Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.