Depending on the tool used you might need to validate the data afterwards. This is a multistep process:
Step 1: Calculate a hash value on the orginal drive.
Step 2: Calculate hash value of forensic image.
Step 3: Compare hash values. They should be identical!
Hashing condenses data into a fixed-length value, helping in detecting alterations or ensuring duplication accuracy. When downloading a file, comparing its hash value with the provided one verifies a successful download. Similarly, during forensic imaging, matching hash values between the original drive and the image confirm an accurate bit-for-bit copy.
Below I have provided demos of using various hashing algorithms in both Kali Linux and Microsoft Windows. I also show a GUI utility called Quickhash-GUI that can run in Windows, MacOS or Linux.
Linux: use the md5sum command
Windows PowerShell: Use Get-FileHash command and make sure you use the -Algorithm flag to specify the hashing algorithm you wish to use.
Linux: use the sha1sum command
Windows PowerShell: Use Get-FileHash command and make sure you use the -Algorithm flag to specify the hashing algorithm you wish to use.
Linux: use the sha256sum command
Windows PowerShell: Use Get-FileHash command and make sure you use the -Algorithm flag to specify the hashing algorithm you wish to use.
Linux: use the sha512sum command
Windows PowerShell: Use Get-FileHash command and make sure you use the -Algorithm flag to specify the hashing algorithm you wish to use.