Forensics Mode:
(Page 17 of 84)  < Prev  12 13 14 15 16 17 18 19 20 21 22  Next >
Re: Problem using dd to clone a hard disk with bad sectors. 2006-02-22
svetlik rac cz
Main problem is that you do not use correct "critical error management" system.
Solution is:
1. in case of bad sector you must know what sector is bad (to log bad sectors)
2. as a result of bad sector reading is not predicable, you should not use this sector in forensic examination
3. content of bad

[ more ]  [ reply ]
RE: Problem using dd to clone a hard disk with bad sectors. 2006-02-22
Shenk, Jerry A (jshenk decommunications com)
I've had this problem also. What I was able to do in my case was to

create two images of the drive. One image was the space prior to the

error and the other was the space after the error. I was then able to

generate a valid matching hash on the entire drive with the exception of

the bad block

[ more ]  [ reply ]
Re: Re: Techniques for tracking attackers through cyberspace? 2006-02-22
g33kus3r gmail com
Hi,
We have done something similar in the past, what kind of personality profile did you build? , I would highly recommend to base your investigation in a social network analysis. http://www.ire.org/sna/. Since it will allow you to widen your search-range (pretty useful when you hit the wall.. ɧ

[ more ]  [ reply ]
Re: Problem using dd to clone a hard disk with bad sectors. 2006-02-19
Matthew Farrenkopf (farrenkm ohsu edu)
Willard,

It may be that you're doing nothing wrong. There may be a sector that is marginal that sometimes the drive can read and sometimes it can't. If it can read it one time, and not another, then you're going to end up with different hash values.

You can try something like:

dd if=/dev/hdb co

[ more ]  [ reply ]
Problem using dd to clone a hard disk with bad sectors. 2006-02-16
Willard Van Dyne (wvandyne hotpop com) (7 replies)

Hi all.

I'm trying to properly clone a 4.3GB (it's old, I know) hard disk
which unfortunately has a lot of bad sectors.
I am using Helix 1.7 as an operating environment, not mounting the
old drive at all.
I used the command:

dd if=/dev/hdb of=/mnt/hda7/image.dd conv=noerror,sync

My problem is

[ more ]  [ reply ]
Re: Problem using dd to clone a hard disk with bad sectors. 2006-02-19
John H. Sawyer (jsawyer ufl edu)
RE: Problem using dd to clone a hard disk with bad sectors. 2006-02-19
Gary Funck (gary intrepid com)
Re: Problem using dd to clone a hard disk with bad sectors. 2006-02-19
Christian (christiand59 web de)
Re: Problem using dd to clone a hard disk with bad sectors. 2006-02-19
Jason Coombs (jasonc science org)
RE: Problem using dd to clone a hard disk with bad sectors. 2006-02-19
Omar A. Herrera (omar herrera oissg org)
Re: Problem using dd to clone a hard disk with bad sectors. 2006-02-19
Volker Tanger (vtlists wyae de)
Re: Problem using dd to clone a hard disk with bad sectors. 2006-02-19
Bob Bishop (rb gid co uk) (1 replies)
Techniques for tracking attackers through cyberspace? 2006-02-15
David Kovar (kovar netcerto com) (1 replies)
Good evening,

We are fencing with someone who's providing us with some clues as to their
personality and writing style. It seems possible that we'd be able to find
traces of him/her in forums, chat rooms, and IRC channels if we applied
appropriate tools and procedures. We've started down this path

[ more ]  [ reply ]
Re: Techniques for tracking attackers through cyberspace? 2006-02-19
S.f.Stover (sam stover gmail com) (1 replies)
Steganography Application Fingerprint Database Version 2.0 Released! 2006-02-13
Chad W. Davis (chad davis backbonesecurity com)
Backbone Security's Steganography Analysis and Research Center (SARC) has
released Version 2.0 of the Steganography Application Fingerprint Database
(SAFDB) that can be used to detect the use of information-hiding
applications to conceal evidence of various types of criminal activity.

Version 2.0 o

[ more ]  [ reply ]
RE: Cell phone forensic question 2006-02-06
Greg Kelley (gkelley vestigeltd com)
DataPilot has it: http://www.datapilot.com/phones_universal.htm#Sanyo

Once you have that cable, you can typically use it with Paraben's cell
Seizure, BitPim or DataPilot's own forensic software.

Greg Kelley, EnCE
Vestige Digital Investigations
Computer Forensics | Electronic Discovery | Corporate

[ more ]  [ reply ]
Cell phone forensic question 2006-02-02
techs secure-this com
I'm looking for the appropriate cables / software to acquire cell phone evidence for the No. PM-8200(S) made by SANYO.

Thanks
John

[ more ]  [ reply ]
Re: Registry Research 2006-02-01
keydet89 yahoo com (1 replies)
Tim,

Thanks. I've got code that does that myself...written in Perl, it runs on any platform that supports Perl...Windows, Linux, Mac, etc.

I'll clarify a bit...I'm not looking for tools to dump the contents of the Registry, or view them. I'm not looking so much for a list of keys, as I am lookin

[ more ]  [ reply ]
RE: Registry Research 2006-02-06
Andrew Sheldon (andrew evidencetalks com) (1 replies)
RE: Registry Research 2006-02-06
Harlan Carvey (keydet89 yahoo com)
CyberCrime Summit 2006-01-29
dave kleiman (dave davekleiman com)

The 4th annual CyberCrime Summit being held Feb
27 - March 3, 2006 at Kennesaw State University in Kennesaw, Georgia.

Sessions that provide in-depth coverage of the hot topics and other issues
facing today's computer forensic professional, including a mock trial
pitting two nationally recognized c

[ more ]  [ reply ]
Registry Research 2006-01-27
keydet89 yahoo com (3 replies)
Is anyone doing research into the Registry, that they are able to publicly share? I'm interested in working with others to develop ways of pulling information from system images, specifically from the raw Registry files.

Thanks,

Harlan

[ more ]  [ reply ]
Re: Registry Research 2006-01-30
FocusHacks (focushacks gmail com)
Re: Registry Research 2006-01-29
Tim (tim-forensics sentinelchicken org)
Re: Registry Research 2006-01-29
Christophe Monniez (d-fence swing be) (1 replies)
Re: Registry Research 2006-02-01
Harlan Carvey (keydet89 yahoo com)
Checkmate: e-zine on Computer Forensics and Incident Response 2006-01-23
K K Mookhey (cto nii co in)
Hi all,

We've launched the first edition of Checkmate - an e-zine focused on
Incident Response and Digital Forensics:
http://www.niiconsulting.com/checkmate

This edition covers the issues that arise during a typical forensics
exercises:
1. Disk imaging: basic approaches to imaging suspect disks

[ more ]  [ reply ]
(Page 17 of 84)  < Prev  12 13 14 15 16 17 18 19 20 21 22  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus