

There is a built-in application called Boot Camp assistant that enable user to install Windows in Mac machine. There are some arguments on tampering data issue when performing this method using a host with Windows operating system. A Firewire cable either Firewire 800 or Firewire 400įigure 8: Firewire external drive is available in FTK Imager.A host or workstation – a PC or laptop with minimum of 2GB RAM.But, bare in mind that only master drive will be made available in TDM. In this mode you can image, make partition, format or copy data within the target Mac’s hard drive.

You may see the target Mac’s hard drive from another machine as external hard drive via Firewire port connection. In this state, we can access the hard drive of targeted Mac machine from another Mac host or a PC via Firewire connection.Īctivation of Target Disk Mode in a target Mac machine will require you to hold down the “T” button while you power on the machine. This mode basically used for troubleshooting. Target Disk Mode is a Mac machine state before it boots the operating system. So, I decided to skip the explanation for both common way with assumption of any digital forensic analyst or practitioner should be competent enough to perform the both imaging methods. In certain circumstances, there are some reasons why you need to use the second method. Obviously, the first method is the most used imaging technique by all digital forensic practitioners in the worldwide. Removal of the hard drive and use of write blocker.Generally, there are 3 methods to image a Macintosh machine in computer forensics case:
