Feb. 20, 2024, 9:16 a.m. | /u/Annual-Train622

Computer Forensics www.reddit.com

I am trying to organise my train of thoughts for image acquisition of Windows machines. The tools at my disposal include FTK Imager, Cellebrite Digital Collector, and Encase Forensics (these being the main ones). 99% of the time, the machine comes to me turned off. I have broken down below the main approaches I can think off. Any comments or suggestions are welcome.

No FDE -> Physically extract drive -> Use write-blocker -> Obtain image

* Should this be the …

acquisition cellebrite computerforensics digital down forensics image machine machines main thoughts tools train windows

Financial Crimes Compliance - Senior - Consulting - Location Open

@ EY | New York City, US, 10001-8604

Software Engineer - Cloud Security

@ Neo4j | Malmö

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Identity Governance Consultant

@ Allianz | Sydney, NSW, AU, 2000

Educator, Cybersecurity

@ Brain Station | Toronto

Principal Security Engineer

@ Hippocratic AI | Palo Alto