IncidentResponsev2

4.19.3 Create Hard Disk Image

Task

Create a forensically sound image of a hard disk from a live or offline system to preserve evidence for analysis without altering the original data.


Conditions

Given:


Standards

Examples

Windows

dc3dd.exe if=\\.\c: of=d:\<TARGET DRIVE>\<IMAGE NAME>.dd hash=md5 log=d:\<LOG DIRECTORY>\<LOG NAME>.log

Linux (Remote Copy)

dd if=/dev/sdX | ssh user@destination_ip "dd of=/destination_path/image.dd"

Note: Replace /dev/sdX with source disk identifier (e.g., /dev/sda).

FTK Imager GUI (Windows)

Guymager GUI (Linux)


End State


Notes

Imaging can be performed from:

Important: Ensure chain of custody with logging, hashing, and evidence bagging procedures.


Tools


Manual Steps

Step 1 → Prepare Destination

Step 2 → Prepare Imaging Tool

Step 3 → Perform Acquisition

Step 4 → Secure and Document


Running Script

Automated CLI (Linux Example)

dc3dd if=/dev/sda of=/mnt/evidence/disk_image.dd hash=sha256 log=/mnt/evidence/disk_image.log
sha256sum /mnt/evidence/disk_image.dd > /mnt/evidence/disk_image.dd.sha256

Automated CLI (Windows Example)

dc3dd.exe if=\\.\PhysicalDrive0 of=E:\evidence\disk_image.dd hash=sha256 log=E:\evidence\disk_image.log

Dependencies


Other Available Tools

Tool Platform Installation Usage
dc3dd Windows/Linux Download from Sourceforge Imaging + hashing
dd Linux/macOS Native Imaging
FTK Imager Windows Installer GUI imaging + hashing
Guymager Linux Pre-installed on many distros Fast GUI imaging

Operator Recommendations and Best Practices

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Original retained + expanded with detailed operator workflow, multi-platform guidance, and procedural checklist Leo