crwdns2933423:0crwdne2933423:0

crwdns2944351:0crwdnd2944351:0How to launch Kali Linux Forensics Modecrwdnd2944351:0crwdne2944351:0

crwdns2933797:0Jacob Mehnertcrwdnd2933797:0crwdne2933797:0

crwdns2936043:0crwdne2936043:0 crwdns2933505:0crwdne2933505:0 Jacob Mehnert

crwdns2933769:0crwdne2933769:0
crwdns2933771:0crwdne2933771:0
crwdns2933801:0crwdne2933801:0
Introduction
***Warning:*** Obtaining unauthorized access to another's computer system or systems is illegal under the [link|https://www.nacdl.org/Landing/ComputerFraudandAbuseAct|Computer Fraud & Abuse Act].
The following guide was made with the purpose of educating others on cyber security tools, technologies, and techniques with the intention of educating others on better protecting their own technologies and data. ***Please use the knowledge gained from this guide responsibly.***
This guide will demonstrate how a user can use the integrated ***'Forensic Mode'***
=== Why is this feature useful ===
Forensic Mode is used by security researchers and pen-testers for the explicit purpose of digital forensics. What is particularly useful about this feature is that it can be booted from a USB device containing a Kali ISO.
Booting into this mode will not mount any system hard drives, that way the operations you preform on the system will not leave any trace.
=== Before you begin ===
***This guide does require you to have a Bootable USB Drive with Kali Linux written to it***. If you don't already have one, you can follow [guide|74811|this guide|new_window=true] to create one.
=== ===
Conclusion
Kali's Forensics Mode can be used for the following purposes...
* Copy data from a systems drive
* Verify image integrity
* Use the included forensic tools to examine files that might cause a systems error, or recover data
=== Additional Information ===
* [link|https://www.kali.org/docs/general-use/kali-linux-forensics-mode/|Official Kali Linux Forensics Mode Page]
=== Disclamer ===
But, the most important thing you should take away from this guide is to remember to use this information responsibly. ***Obtaining unauthorized access to another's computer system or systems is illegal under the [link|https://www.nacdl.org/Landing/ComputerFraudandAbuseAct|Computer Fraud & Abuse Act].***
***Please use the knowledge gained from this guide responsibly.***