Procedure for Acquiring Forensically sound images using paladin (2024)

Forensic acquisitions must have the following aspects.

PALADIN stands as a no-cost, bootable forensic Linux distribution rooted in Ubuntu, thoughtfully presented by SUMURI. The boot sequence has been adapted to ensure the preservation of computer and device internal or external media, avoiding any alterations or mounts. The PALADIN system is accessible through either a DVD or a USB drive.

Upon initiation, users will gain access to a diverse array of precompiled open-source forensic utilities designed for diverse tasks. Notably, the heart of this toolkit is the PALADIN Toolbox, meticulously engineered to consolidate and simplify multiple forensic operations into an intuitive GUI (graphical user interface), requiring minimal training and obviating the need for command-line interaction. Powering the PALADIN Toolbox is a compilation of applications, well-established and endorsed by forensic examiners and investigators over the years, their reliability having been tested and upheld in numerous court proceedings.

Download the PALADIN ISO?

  1. Navigate to www.sumuri.com.
  2. Sign into your account via the “My Account” menu. If you do not currently have an ac-count you will need to register for a free account.
  3. Navigate to the PALADIN page via the “Products” menu.
  4. Select the version of PALADIN that you would like to download.
  5. Name your price then select “Add to Cart”.
  6. Review your “Cart” then select “Proceed to Checkout”.
  7. Provide the requested information and select “Place Order”

In order to safely boot PALADIN on standard PCs (non-Macs) please make sure that you are comfortable with the following:

  1. Disabling Secure Boot
  2. Setting Boot Options within the BIOS/UEFI
  3. Accessing the Boot Manager

After successfully accessing the BIOS/UEFI Setup Utility, navigate to the “Security” menu. Inside this menu, you’ll be able to deactivate the Secure Boot feature and preserve the alterations. With Secure Boot disabled and your modifications saved, proceed to shut down the computer. Upon restarting, you can begin using PALADIN.

Procedure for Acquiring Forensically sound images using paladin (2)

Acquiring Evidence using PALADIN

Step 1: Establish a connection with the bootable Paladin OS.

Step 2: Choose the Forensic Mode.

Procedure for Acquiring Forensically sound images using paladin (3)

Step 3: PALADIN will initiate its desktop interface upon booting.

Procedure for Acquiring Forensically sound images using paladin (4)

Step 4: Navigate to the bottom-left corner and click on the “App Menu.” and Select “Paladin Tool Box” from the menu.

Procedure for Acquiring Forensically sound images using paladin (5)

Step 5: The Tool Box will open.

Procedure for Acquiring Forensically sound images using paladin (6)

Step 6: Select Source HDD to be acquired

Procedure for Acquiring Forensically sound images using paladin (7)

Step 7 : Next, proceed to choose the desired image type.

Procedure for Acquiring Forensically sound images using paladin (8)

Step 8: After selecting the image type, a new window will appear.

Procedure for Acquiring Forensically sound images using paladin (9)

Step 9: Enter the case number and provide all the required details in the provided fields.

Procedure for Acquiring Forensically sound images using paladin (10)

Step 10: Choose the destination drive, which must be another HDD connected via USB.

Procedure for Acquiring Forensically sound images using paladin (11)

Step 11: Enter the label and then initiate the process by clicking “Start.”

Procedure for Acquiring Forensically sound images using paladin (12)

Select this if you would like to divide your forensic image file into
smaller segments or “chunks”. Due to Linux FAT32 limitations (VFAT), 2000 Mb is the largest size allowed.

Step 12: You will be able to observe the progress bar during the operation.

Procedure for Acquiring Forensically sound images using paladin (13)

There are two main types of logs in PALADIN:
1. Task Logs : keep a historical record of the “tasks” that have been executed within a single PALADIN Toolbox session.
2. System Logs : display information to assist with troubleshooting.
3. Module Specific Logs : Logs show information relating to the current module being used and typically shows live information. For example, in the image below you are seeing Module Specific Logs for the Imager Module (“Imager 1” and “Imager 2”).

Procedure for Acquiring Forensically sound images using paladin (14)

Upon completion, the interface will resemble the screenshot below.

Procedure for Acquiring Forensically sound images using paladin (15)
Procedure for Acquiring Forensically sound images using paladin (16)

The destination folder will have log files of acquisition, which will also contain hash.

Procedure for Acquiring Forensically sound images using paladin (17)

The main focus of this blog is on students and entry level professionals

Procedure for Acquiring Forensically sound images using paladin (2024)

FAQs

What is a forensically sound image? ›

Introduction. Before any forensic investigation or analysis can begin, a forensically sound image must be captured of the data storage device. These forensically sound images must be a bit-by-bit, physical copy of the device. Without such a copy, any evidence will likely be inadmissible in a court of law.

What is Paladin forensic? ›

PALADIN Forensic is a modified “live” Linux distribution based on Ubuntu that simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox.

Is FTK imager forensically sound? ›

FTK Imager is a free data preview and imaging tool used to acquire electronic evidence in a forensically sound manner by creating copies of computer data without making changes to the original evidence.

Is Paladin forensic Suite free? ›

PALADIN stands as a no-cost, bootable forensic Linux distribution rooted in Ubuntu, thoughtfully presented by SUMURI.

What are the techniques used in acquiring forensic image? ›

Generally, there are three primary types of forensic image collection techniques: 1) creating a physical forensic image of the device; 2) collecting a logical image; or 3) doing a targeted collection of device data. Determining the appropriate forensic image format depends on the nature of the legal matter and budget.

What is forensically sound process? ›

Forensically sound data collection refers to the process by which ESI is collected for ediscovery without any alteration or destruction of either the data or its metadata. To be forensically sound, the collection process must be defensible: consistent, repeatable, well documented, and authenticated.

How to make forensically sound copies of digital information? ›

The forensic analysis process includes four steps:
  1. Use a write-blocker to prevent damaging the evidentiary value of the drive.
  2. Mount up and/or process the image through forensics software.
  3. Perform forensic analysis by examining common areas on the disk image for possible malware, evidence, violating company policy, etc.

What is the difference between FTK and FTK imager? ›

Mark A.

FTK Imager is mostly just for disk imaging and quickly inspecting a disk image, and FTK itself is for undertaking detailed inspection, analysis, and reporting on those disk images.

What are the requirements for FTK imager? ›

A computer with a minimum of 4 GB of RAM and a 64-bit operating system. A USB drive with at least 8 GB, if student plan to install FTK Imager on a USB drive. Basic knowledge of computer operating systems and digital forensics concepts.

Which forensic tool is best? ›

12 Best Digital Forensics Software Shortlist
  • Cyber Triage - Best for rapid incident response.
  • Magnet AXIOM - Best for mobile and cloud evidence recovery.
  • Cellebrite - Best for on-site mobile data extraction.
  • IBM Security QRadar SIEM - Best for security event and log management.
May 6, 2024

What is the best mobile forensic tool? ›

Top 10 Essential Mobile Forensics Tools for 2024
  • Tool 1: Cellebrite UFED.
  • Tool 2: Oxygen Forensic Detective.
  • Tool 3: XRY by MSAB.
  • Tool 4: Magnet AXIOM.
  • Tool 5: SPF Pro by SalvationDATA.
  • Tool 6: MOBILedit Forensic Express.
  • Tool 7: EnCase Forensic.
  • Tool 9: Andriller.
May 27, 2024

How much is the FTK forensic toolkit? ›

Name: AccessData Forensic Toolkit (FTK) Description: This is a heavyweight general-purpose cyberforensic tool with a lot of features, add-ons and built-in power. Price: Perpetual license: $3,995 and yearly support is $1,119; one-year subscription license: $2,227 and yearly support included at no additional cost.

What is a forensic image example? ›

Forensic imaging is the process of creating an exact duplicate (or “image”) of a digital storage device, such as a hard drive or memory card. This duplicate can then be analysed for evidence without affecting the original device.

What is the definition of forensic soundness? ›

Defining Forensic Soundness

The generally accepted definition of forensic soundness is “the application of a transparent digital forensics process that preserves the original meaning of data for production in a court of law.”

What does "forensically" mean? ›

adverb. /fəˈrenzɪkli/ /fəˈrenzɪkli/ ​in a way that makes use of the scientific tests that the police use when trying to solve a crime.

What is audio forensics? ›

Audio Forensics is the application of analysis and processing to further the investigative use of recorded audio. This covers three general areas: Enhancement to improve the signal quality and intelligibility of signals of interest, such as speech, by attenuating noise or otherwise increasing the signal-to-noise ratio.

Top Articles
Latest Posts
Article information

Author: Rev. Porsche Oberbrunner

Last Updated:

Views: 5995

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rev. Porsche Oberbrunner

Birthday: 1994-06-25

Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838

Phone: +128413562823324

Job: IT Strategist

Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing

Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.