

Make sure you turn off 'automount' as it may change the evidence. Using that image above is a completely extraneous step it's only there as an option.ģ. Make sure to remove the drive and reinsert it so Linux will reread the partition table since you're overwriting the previous table. If your USB drive is assigned as /dev/sdb, you can overwrite 1GB worth of your drive with: This is the current image I am using in 4860: If you'd like to overwrite a larger drive with a smaller partition, you can use this image from Spring's CET4860: Using this image below is a completely extraneous step it's only there as an option.

You're not trying to make hashes match to the evidence, so it doesn't matter what you use. The goal is to validate the tools and do they each produce the same or different results. Get a small thumb drive, the smaller the better, and place a few files on the drive of varying file types e.g., a JPG, PDF, DOC, TXT, etc.
#PRODISCOVER BASIC FILE FORMATS WINDOWS#
#PRODISCOVER BASIC FILE FORMATS PRO#
Upon examination, the two forensic examiners reported producing different SHA1 hashes for the same evidence the prosecution used FTK Imager while the defense used Pro Discover. Each examiner was provided verified forensic duplicates of the original evidence. There are two forensic examiners working as expert witnesses on a case in which Judge Stone is presiding - one for the prosecution and one for the defense.
