Feb. 20, 2024, 9:16 a.m. | /u/Annual-Train622

Computer Forensics www.reddit.com

I am trying to organise my train of thoughts for image acquisition of Windows machines. The tools at my disposal include FTK Imager, Cellebrite Digital Collector, and Encase Forensics (these being the main ones). 99% of the time, the machine comes to me turned off. I have broken down below the main approaches I can think off. Any comments or suggestions are welcome.

No FDE -> Physically extract drive -> Use write-blocker -> Obtain image

* Should this be the …

acquisition cellebrite computerforensics digital down forensics image machine machines main thoughts tools train windows

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC