Forensic Imaging And Analysis
Write-blocked acquisition, volatile memory capture, SHA-256 and MD5 hash verification, and open-source analysis of the resulting images. Petronella Technology Group runs a Linux-based forensic stack built around The Sleuth Kit, Autopsy, Volatility, and libewf, with full chain-of-custody documentation.
What Is Forensic Imaging and Analysis?
Forensic imaging is the process of creating a bit-for-bit copy of storage media in a way that preserves the original, produces a verifiable duplicate, and supports later analysis against the copy rather than against the original. Forensic analysis is what happens on the copy: file-system reconstruction, deleted-file recovery, memory-process review, registry analysis, timeline construction, and indicator-of-compromise extraction.
The goal of the whole exercise is to answer questions about what happened on a specific piece of hardware at a specific point in time, and to answer them in a way that a skeptical party reviewing our work could reproduce from the same evidence. Good imaging is the foundation. Good analysis is the value add. We do both in a single integrated workflow so the handoff between acquisition and analysis does not introduce errors or gaps.
This page gives you the practical detail behind our imaging-and-analysis service. It covers the preservation order we follow, the open-source toolkit we use, the hash verification practice, how we handle chain of custody, and where to escalate when a case calls for tools or licensure outside our scope. It is written for IT leaders, compliance officers, and counsel who want to understand what they are paying for when they engage us.
What Is the Linux-Based Forensic Imaging Stack?
We image from a Linux acquisition workstation using open-source tools. The workflow is documented, repeatable, and uses utilities any forensic examiner can verify.
Write-Blocking Hardware
Before any source drive is connected to the acquisition workstation, it goes through a hardware write-blocker. Tableau and WiebeTech are our field workhorses. The write-blocker physically prevents any command from the acquisition workstation from modifying the source drive, which means the evidence cannot be altered during acquisition even by accident. This is a foundational control. Without write-blocking, a Windows host auto-mounting a suspect drive and dropping System Volume Information directories on it is enough to compromise the evidence.
Raw Imaging With dd And dc3dd
For format-neutral raw images we use dd or its forensic-focused sibling dc3dd. A typical invocation looks like this:
sudo dc3dd if=/dev/sdX of=/evidence/case-123/suspect-disk.img \
hash=md5 hash=sha256 log=/evidence/case-123/acquisition.log
The command images the entire source device sector by sector into a raw image file while computing MD5 and SHA-256 hashes on the fly and writing a log of every action taken. The resulting .img file is format-neutral and readable by almost any forensic tool.
Expert Witness Format With libewf
For compressible evidence or cases where embedded metadata matters, we use ewfacquire from the libewf project to produce Expert Witness (E01) format images. The E01 format embeds acquisition metadata, hash values, and case information directly in the file, which makes later chain-of-custody documentation cleaner. Invocation:
sudo ewfacquire -t /evidence/case-123/suspect-disk \
-c bzip2 -l /evidence/case-123/acquisition.log \
-C case-123 -D "Workstation imaged for BEC investigation" \
-E "case-123-e001" -e "Lead Examiner" -N "Case 123 disk acquisition" \
/dev/sdX
The tool walks an interactive prompt for case metadata and produces one or more .E01 files plus a log, all hashed and ready for transport.
Volatile Memory Capture
Where the host is still running and memory matters (almost always), we capture volatile memory before anything else touches the system. For Windows we run winpmem to disk or across the network, for Linux we load the lime kernel module, for macOS we run OSXPmem while being realistic that Apple Silicon SIP constraints limit what user-space memory acquisition can capture. Memory images are compressed, hashed, and treated with the same chain-of-custody discipline as disk images.
Which Forensic Evidence Must Be Preserved First?
Digital evidence has a lifespan. Some of it disappears in seconds, some in minutes, some lasts for years. The order of volatility concept comes from RFC 3227 and has been the standard preservation ordering in the forensics community for over two decades. Our acquisition workflow follows it.
- CPU registers, cache, and pipeline state. Seconds of lifespan. Captured only if a running system can be probed with live-response tooling before it shuts down.
- Routing tables, ARP cache, process tables, kernel statistics. Minutes of lifespan. Captured through live-response scripts that run authorized commands on the live host.
- Physical memory. Minutes to hours of lifespan depending on how the machine is handled. Captured with
winpmem,lime, or OSXPmem before any shutdown or reboot. - Temporary filesystems and swap. Lifespan of reboot cycles. Captured through live-response or through disk imaging once the host is isolated.
- Persistent disk storage. Stable on the timescale of hours to days. Imaged with write-blocking and hash verification after volatile capture completes.
- Remote logging and cloud telemetry. Stable on the timescale of the retention policy. Preserved through vendor-native export.
- Physical configuration. Stable on the timescale of physical changes to the environment. Documented from asset management, switch and firewall configurations, and photographs of the physical setup.
- Archival media. Stable on the timescale of months to years. Acquired as needed once the urgent collection is complete.
The order matters because skipping a high-volatility source to grab a lower-volatility one first is how evidence gets lost. A careful examiner always thinks through the list and documents which items were in scope, which were out of scope, and why.
Why Hash Forensic Images With Both MD5 and SHA-256?
Every forensic image we produce is hashed twice. MD5 is computed alongside SHA-256 for every evidence file. The hashes are recorded at three points: at the source before imaging completes, on the destination image file after imaging completes, and again on the image file before analysis begins.
Why Two Algorithms
MD5 has known collision vulnerabilities and is no longer considered cryptographically secure, but it is still the de-facto standard in many forensic workflows, legal tools, and evidence-management systems. Abandoning MD5 would break interoperability with systems our clients' counsel already use. SHA-256 is the modern standard, collision-resistant, and the one we rely on for actual integrity verification. Including both in every record lets us satisfy both audiences without forcing anyone to choose.
Hash Timing
A hash taken only at the end of imaging does not prove the source was unchanged by the imaging process. That is why dc3dd and ewfacquire compute hashes during the imaging operation, reading the source one time and producing both the image file and the hash in parallel. If the source changes mid-image, the computed hash will not match a subsequent read and the discrepancy surfaces immediately.
Hash Verification In Practice
When we mount an image for analysis, the first step is to regenerate its SHA-256 and compare against the acquisition-time value. A match means the image is bit-for-bit identical to what was acquired. A mismatch halts analysis and triggers a root-cause investigation. In eight years of running this workflow, mismatches have been vanishingly rare and always attributable to storage media failure rather than evidence tampering, but the discipline is what makes that confidence possible.
Example Hash Record
Evidence ID: CASE-123-DISK-001
Source: /dev/sdX (1 TB Samsung SSD, serial S123ABC)
Acquired: 2026-04-18 14:32:17 EDT
Examiner: Lead Forensic Analyst
Method: dc3dd, write-blocked via Tableau T35u
Image Path: /evidence/case-123/suspect-disk.img
MD5: b1946ac92492d2347c6235b4d2611184
SHA-256: 7f83b1657ff1fc53b92dc18148a1d65dfc2d4b1fa3d677284addd200126d9069
Verified: 2026-04-18 14:58:04 EDT (post-acquisition re-hash matches)
What Open-Source Forensic Analysis Tools Do We Run?
Analysis runs against verified copies of the evidence. We use open-source tools with long forensic pedigrees so our methodology is reproducible by any examiner on the other side.
The Sleuth Kit + Autopsy
Timeline construction, deleted file recovery, NTFS and ext4 metadata extraction, file-signature-based identification, and hash-based known-file filtering. The standard open-source disk forensics toolkit.
Volatility 3
Process listing, injected-code detection, handle analysis, registry extraction from page-cached hives, network-connection reconstruction from kernel structures, and malware-family identification from memory indicators.
Wireshark And Zeek
Wireshark for interactive packet analysis, Zeek for corpus-scale network log generation (conn, dns, http, ssl, files, weird), and Suricata for replaying packet captures against current IDS signature sets.
Yara
Pattern-based matching for known malware signatures, command-and-control indicators, and custom case-specific rules. Run across disk images, memory images, and extracted file collections.
libewf, winpmem, lime
The E01 Expert Witness format library, Windows memory acquisition, and Linux memory acquisition tooling. All open-source and widely peer-validated.
Python And Jupyter
Custom Python scripts and versioned Jupyter notebooks tie the analysis together. Notebooks capture the examiner's reasoning inline with the commands so the full analytical path is preserved, not just the final conclusions.
Documentation That Closes The Evidence Loop
Chain of custody is a written record, kept in parallel with physical evidence handling, that lets any reader reconstruct where a piece of evidence was, who had access, and what was done to it, from the moment it entered our control until the moment it left. We keep chain-of-custody records on paper and in an encrypted digital case-management system in parallel, with paper as the authoritative version.
Every evidence item gets its own form. The form starts at acquisition with the evidence identifier, source description, acquisition method and tool, cryptographic hashes, acquiring examiner, and date and time. Every subsequent movement (transport, storage location change, hand-off to another examiner, access for analysis, return to client, destruction) is recorded on the form with date, time, and the name of the handling person. Handoffs to third parties (counsel for inspection, law enforcement for seizure, a second examiner for peer review) are captured with a signed receipt from the receiving party.
Forms are reviewed at case close and bound with the final report. The complete chain of custody for every piece of evidence referenced in the report is preserved for the duration of the engagement letter's retention period and provided to counsel on request. The discipline is boring on purpose. An opposing expert who reads our chain-of-custody record should find nothing novel and no unexplained gaps.
What We Image And What We Refer Out
In Our Scope
The imaging and analysis work we run in-house covers the core investigative surface for the incident types we specialize in.
- Windows, Linux, and macOS workstation and server disks
- SSDs and NVMe drives with SSD-aware acquisition approach
- RAID arrays with logical-level acquisition through hypervisor or RAID controller
- Virtual machines through hypervisor snapshot export
- Windows, Linux, and macOS volatile memory
- Cloud artifacts via vendor-native export (M365, Azure AD, Google Workspace)
- Network packet captures and flow records
Referred To Partners
Work that requires tool licenses or licensure we do not hold gets referred to vetted partners who specialize in that space. We coordinate the broader investigation around their timeline so you do not pay for duplicate discovery.
- Physical-level mobile device extraction (iPhone physical, Android chip-off)
- Family-law device imaging and custody-related workflows
- Large-firm review-platform e-discovery at the multi-terabyte scale
- Industrial control system and SCADA forensics
- Licensed private-investigator surveillance or process service
- Vehicle infotainment and IoT device imaging
Imaging Workflow At A Glance
Photograph and document the evidence
Photos of the device, labels, cabling, and physical state. Serial numbers, asset tags, and observable condition recorded.
Apply the write-blocker
Hardware write-blocker connected between source drive and acquisition workstation. Read-only connection verified.
Capture volatile memory first
If the host is running, memory capture precedes disk imaging. Captured image hashed and secured before the machine is powered off.
Acquire the disk
Image the source drive using dc3dd or ewfacquire. Compute hashes on the fly. Log every action to a durable acquisition log.
Verify hashes
Regenerate SHA-256 on the resulting image and compare to the acquisition-time value. Any mismatch halts the workflow for investigation.
Open chain-of-custody form
Written chain-of-custody form started for the evidence item. All subsequent handling recorded on the form with timestamps.
Transport to secure storage
Evidence sealed, labeled, and transported to our controlled storage. Hashes verified again on arrival before the form is updated.
Create analysis working copy
A working copy is produced from the primary evidence image for analysis. The primary stays untouched as the authoritative source.
Analyze on working copy
All analysis runs against the working copy using The Sleuth Kit, Autopsy, Volatility, Wireshark, Zeek, Yara, and Python tooling.
What Analysis Techniques Do We Apply to the Working Copy?
Once a verified working copy of the evidence is loaded into our analysis environment, the real investigation begins. The specific analytical path depends on the case. A BEC investigation leans on mailbox artifacts, registered OAuth grants, and audit-log correlation. A ransomware case leans on process execution history, persistence mechanism enumeration, and malware family identification. A crypto-theft case leans on browser history, messaging-app exports, and on-chain transaction tracing. The techniques below are the common core that shows up in some form in almost every engagement.
Timeline Reconstruction
A forensic timeline stitches together filesystem metadata, application artifacts, log entries, and system events into a single chronological view of what happened on the host. The Sleuth Kit produces filesystem timelines (MFT records on NTFS, inode metadata on ext4). Autopsy overlays Windows event logs, browser history, and application-specific artifacts. Registry extraction pulls USB insertion history, program execution records (AmCache, ShimCache, Prefetch), and user activity indicators. Everything gets normalized into a unified timeline with minute-level precision where the source supports it.
Deleted File Recovery
Files that were deleted but not overwritten can often be recovered from unallocated space. The Sleuth Kit's fls and icat recover filesystem-aware deleted files. PhotoRec does signature-based recovery for files that have been unlinked from the filesystem entirely. Where TRIM has run on an SSD, recovery is often not possible, and we document the SSD-aware constraint in the methodology section rather than pretending a full recovery is available.
Memory Analysis
Volatility 3 against a memory image gives us running process lists, DLL loads, code injection indicators, hidden processes, network connections at the moment of capture, credential material, and registry hive content from the page cache. Memory analysis is often where active intrusions reveal themselves most clearly because many malware families never touch disk.
Indicator Hunting With Yara
Yara rules let us sweep an entire disk image, memory image, or file collection for matches against known malware signatures, command-and-control indicators, and case-specific patterns. Public Yara repositories cover most common malware families. For targeted investigation we often author case-specific rules that target a specific threat actor's unique artifacts.
Registry And Event Log Analysis
Windows registry and event logs together tell most of the story of what happened on a Windows host. User logons, privilege escalations, service installations, scheduled task creation, RDP sessions, PowerShell execution, and many attacker persistence mechanisms land somewhere in these sources. We extract, normalize, and correlate registry and event log data across the relevant hosts to reconstruct attacker activity.
Browser And Application Artifacts
Chrome, Edge, Firefox, and Safari all leave rich artifact trails: browsing history, download history, autofill data, session cookies, and credential storage. Email clients (Outlook, Apple Mail, Thunderbird) leave message databases, calendar records, and contact lists. Cloud-synced applications (OneDrive, Dropbox, Google Drive) leave sync logs and local cache that shows what files were accessed. All of these are part of the analyst's toolkit for reconstructing user and attacker behavior.
Forensic Imaging Questions
Do you image SSDs and NVMe drives?
Yes, with caveats. Solid-state drives introduce complications a spinning-disk workflow does not face. TRIM commands can silently erase deleted data before acquisition completes. Wear leveling scrambles the physical-to-logical mapping. Self-encrypting drives require credentials. Our imaging workflow flags these conditions, documents them in the acquisition notes, and adapts the approach (disabling write channels, imaging to a known-state, capturing logical plus memory as a fallback).
Can you image a running server without taking it offline?
For virtual servers we can work through hypervisor snapshots and export the snapshot VMDK, VHDX, or QCOW2 file for offline analysis without affecting the live VM. For physical servers that cannot come down, live memory capture plus targeted collection of log files and high-value directories is often enough to preserve the case until scheduled downtime for full disk imaging.
What format do you deliver evidence images in?
Default delivery format is Expert Witness E01 with embedded metadata and hash values. Raw dd is available for cases where format-neutrality matters or where the receiving party is using tools that prefer raw. We deliver compressed where bandwidth or storage is a constraint and uncompressed where acquisition speed matters more than size.
How long do you retain evidence after the case closes?
The default retention is the duration of the matter plus one year. For regulated industries or cases with active litigation holds, we extend retention on counsel's written direction. At the end of the retention period, evidence is destroyed through cryptographic shredding of encrypted container keys and physical media destruction, with a signed certificate of destruction issued to the client.
Can we watch the imaging happen?
Yes. A client representative, counsel, or the opposing party's examiner is welcome to observe onsite imaging. For remote cloud acquisition we can screen-share the acquisition workstation so observers see every action in real time. We have run observed acquisitions for dozens of contested matters.
Do you handle mobile phones and tablets?
We handle the cloud-side of mobile cases: iCloud backups, Google account audit logs, Microsoft account sign-in history, mobile device management exports, and SIM-swap-related carrier records. Physical extraction of mobile devices requires licensed tools we do not operate in-house. For those we refer to a vetted partner who specializes in mobile forensics and coordinate the broader investigation around their work.
What if the image you produce needs to be shared with another expert?
Because we deliver in standard open formats (E01 and raw dd) with SHA-256 hashes, the opposing expert can load the same image into any forensic tool they prefer and verify the hash matches ours. This interoperability is the point of using open formats and documented methodology. A second expert should be able to pick up the evidence without needing access to any proprietary tool we used. Hand-offs to second experts are routine and uneventful when the underlying discipline is solid.
Related Forensic Services
Need Forensic Imaging Services?
Call for a confidential consultation about your case. We produce write-blocked, hash-verified, chain-of-custody-documented forensic images and analysis you can stand behind.