Lab 2 - Forensic Imaging
Lab 2 - Forensic Imaging
Objectives:
Use DumpIt.exe to capture memory from a live system
Use FTK Imager to make a live forensic image of a USB drive
Practice navigating and exporting files from a forensic image using FTK Imager.
1. Put the executable DumpIt in a directory that will serve as the storage location for the volatile
memory evidence. *Note: This location would normally be an external device because you
never want to write to your own evidence drive. However, for the purposes of this lab, feel free
to store the volatile memory on the host system.
w w w. c y b e r c r i m e i n v e s t i g a t o r s . c o m
1
IFCI – Cybercrime Investigator Computer Forensics Course
Lab #2 – Forensic Acquisitions
w w w. c y b e r c r i m e i n v e s t i g a t o r s . c o m
2