Skip to main content

Collecting Data

  • Chapter
  • First Online:
  • 2399 Accesses

Abstract

The common and best practice for conducting a forensic examination is to create a bit-by-bit copy of the storage device that you are set to examine and then analyze the copy. Working in this manner ensures that the actual storage device is not contaminated and can even provide performance benefits. This chapter begins with a description of how to create this bit-by-bit copy, called disk image, using the tool FTK imager on a running or turned off computer. The chapter then describes how to collect volatile data including taking a memory dump and extracting registry hives from a Windows computer during a live examination. At times, you find a computer that is turned on and you are not able to extract any data from the computer because it is logged out or likewise. In those cases, it is possible to extract information from memory using invasive techniques. This chapter introduces two such techniques, DMA attack and cold boot attack. At the end of the chapter, some constraints and considerations relating to collecting video from surveillance equipment are presented.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://www.wireshark.org/#download

  2. 2.

    https://www.magnetforensics.com/free-tool-encrypted-disk-detector/

References

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kävrestad, J. (2020). Collecting Data. In: Fundamentals of Digital Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-38954-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-38954-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-38953-6

  • Online ISBN: 978-3-030-38954-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics