Dead Box Forensics
Objective
Hands-on practice with dead box forensics techniques.
Tools & Technologies
AutopsyddThe Sleuth Kitsha256sum
Key Commands
dd if=/dev/sda of=image.dd bs=4M conv=noerror,syncsha256sum image.ddautopsyfls -r image.ddLab Steps
01
Disk Imaging
Create a forensic disk image with dd and verify hash integrity.
02
Filesystem Analysis
Mount image read-only and examine filesystem metadata.
03
File Recovery
Use Autopsy and TSK to recover deleted files.
04
Timeline Creation
Build a filesystem activity timeline with mactime.
Challenges Encountered
- Mounting image read-write modifies access times and destroys evidence
- Write blockers should be used on original media
Key Takeaways
- Always image before analyzing — never work on original media
- MD5/SHA256 hashes prove image integrity in legal proceedings