Disk Forensics

Overview

Disk forensics involves acquiring, preserving, and analyzing data stored on physical and logical storage media. Proper forensic handling ensures evidence integrity through write-blocking, cryptographic hashing, and chain-of-custody documentation. Analysis covers partition structures, filesystem metadata, deleted file recovery, and timeline reconstruction.

Topics in This Section

  • Disk Acquisition & Imaging — creating forensic images with dd, dc3dd, and EWF tools while maintaining evidence integrity
  • Filesystem Analysis — examining partition layouts, filesystem structures, and metadata using The Sleuth Kit
  • File Recovery & Carving — recovering deleted files and carving data from unallocated space
  • Timeline Analysis — building activity timelines from filesystem timestamps and system artifacts

General Approach

Evidence received (disk, image, or device)
    │
    ├── Write-block the device (hardware or software)
    ├── Create forensic image (bit-for-bit copy)
    ├── Hash original and image (MD5 + SHA-256)
    │
    ├── Identify partitions and filesystems
    │   ├── mmls → partition layout
    │   ├── fsstat → filesystem details
    │   └── fls → directory listing
    │
    ├── Recover deleted files
    │   ├── fls -d → deleted entries
    │   ├── icat → extract by inode
    │   └── File carving (scalpel, foremost, photorec)
    │
    ├── Build timeline
    │   ├── fls -m → body file format
    │   ├── mactime → human-readable timeline
    │   └── Correlate with system logs
    │
    └── Document findings and preserve chain of custody