top of page
Search
nantmigheartgekhol

What is software USB write blocker and why you need it for your Windows 10 PC



Thumbscrew is my attempt at a poor man's USB write blocker. When used it allows you to quickly enable or disable writing to all USB mass storage devices on your Windows system. In other words, you can use it to make a USB flash drive, hard drive or IDE / SATA drive in an enclosure read only. However, I make no guarantees as to its forensic validity. Still, if your poor and you want to play around with making forensic images of thumb drives and other USB mass storage devices it may come in handy. You will see one of two icons in your system tray to indicate whether or not USB mass storage devices are set to be read only:




Software USB write blocker




2. USB mass storage devices that are already mounted as writeable will stay writeable until they are removed and reinserted. The same applies if you turn off read only protection while a USB mass storage device is active, it will become writable and stay that way until removed and reinserted.


The Digital Intelligence USB 3.1 - PCIe write blocker kit is used to create forensically sound images of PCIe connected NVMe M.2 and U.2 SSD storage drives. This imaging device is sold as a kit only and includes all components necessary to quickly and efficiently image M.2 and U.2 SSD's. Requires third party forensic imaging software for operation.


Write Blocker is a tool designed to prevent any write access to the hard disk, thus permitting read-only access to the data storage devices without compromising the integrity of the data. A write blocking if used correctly can guarantee the protection of the chain of custody. NIST has issued a set of general guidelines for write blocking requirements:


This special feature is available for write-blockers designed for USB devices: USB WriteBlocker, Media WriteBlocker, and USB DataDiode. Although these products cannot be reprogrammed and do not support firmware updates, FSU can offer piece of mind that the products have not had their firmware tampered with. FSU calculates a hash value for the firmware on the product and reports whether the hash matches known-good values.


Nearly all CRU forensic products look for and identify hidden areas on hard drives called HPA or DCO. How the products handle such areas is then up to you. There are four ways for a write-blocker to handle HPA or DCO areas:


Consider whether you will need to write external drives you will be connecting with. Some hardware write blockers allow you to alternate between read/write and read-only modes, while others are limited to read-only. If your work requires you to connect IDE/SATA to your workstation for writing, you should consider a write blocker that supports both modes.


Before purchasing, make sure the write blocker is compatible with Advanced Drive Formats. To meet the demand for more drive space, hard drives today have increased sector size to 4096. Some have even gone beyond that size. Be sure that the write blocker you select supports the most common and prevalent format type of 512e.


This model is ideal for forensics, and you can easily attach 2.5-inch laptop drives, IDE 3.5-inch drives, or any other regular SATA drive. Once in the write protect mode, rest assured that your system is protected from tampering with the data of connected drive. Just make sure the write-protect switches are correctly toggled before the device is powered on.


The only downside is that when compared with Tableaus, the data transfer rate is rather slow. Considering it costs nearly one-sixth of the price, the bargain does make sense. If you are looking for a low-cost write blocker with decent performance, or if you want a secondary write blocker for home, Coolgear has your back.


The device features seven LEDs providing a status update about SATA media detection, power, IDE media detection, write block status, host connection status, and activity status. All the information is then displayed on the integrated and backlit LCD screen on the front.


The Tableau Forensic PCIe Bridge TK7U BNDLB is the first-ever portable hardware write blocker that allows forensics of PCIe solid-state drives while being used in conjunction with a Tableau PCIe adapter.


The drive connectors (USB 2.0, USB 3.0, eSATA, and FireWire 800) allow easy insertion and auto-alignment. All you need to do is connect the device with the drive, power it on, and you can toggle between the read/write and write blocking options. Switching between the two modes is very easy in this model. Nevertheless, it is impossible to unintentionally turn off the write-blocking mode.


This blocker allows you to detect, remove or even modify DCOs (Device Configuration Overlays) and HPAs (Host Protected Areas), which are sometimes used by criminals to hide data. With the ComboDock you can quickly access information about disk health, the number of hours used, the firmware model number, power cycles, and other critical information.


This model weighs 2.2 lbs., a weight that may put off some users. However, we do not see how that may hinder investigations in any way. Overall, this is an excellent mid-range option for people looking for affordable, yet reliable, hardware write blockers.


Today, we listed some of the best hardware write blockers available to you for purchse. Ensuring data integrity has a critical role to play in data acquisition for any computer forensics or digital investigator. This is impossible without a reliable hardware write blocker. All the products mentioned above have been tested over the years for their performance, reliability, and efficiency. You may choose any of the models discussed above without a second thought. Even so, before purchasing any product, always check the device information. Good luck!


Blocking your USB ports is best done via USB control software, and few are as efficient as Device Control Plus since it offers you all the tools you may ever need to gain better control over your USB-based removable media.


So, this software provides complex protection against data loss with USB drives, external drives, CD/DVD drives, and other portable devices. It can also hinder websites and applications to see and steal your online data.


Provide effective protection for vulnerable systems using Systools software to block USB drives now. Check price Visit website NewSoftwares USB Block NewSoftwares USB Block is one of the top USB block software tools. It prevents data leaks by restricting USB drives, external devices, and ports on your computer. You will be able to whitelist only your portable drives while blocking all the others.


In terms of vendors, it all depends on what tasks need to be accomplished. Obviously, the software should not only block writing to disk, but it also would be helpful to be able to pull the results of the tool into a case management system (like Guidance Software Inc.'s EnCase product line). It's also important that the vendor be able to point to where the tool has been used successfully in legal proceedings, since admissibility is usually a matter of precedent.


A few open source options are starting to appear (search Google for "software write-blockers" to get the latest list), and there are a few utilities like PDBLOCK and RCMP HDL available. NIST is starting to do detailed evaluations of these tools, as well as of hardware write-blockers, which might also be helpful.


This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source tools, be able to write-block USB mass storage devices using software and microcontroller-based hardware, be able to impersonate other USB devices, and understand how to make forensic duplicates of USB mass storage devices. Along the way students will also learn how to use microcontrollers and Udev rules. A non-exhaustive list of topics includes:


Write blockers are devices that allow acquisition of information ona drive without creating the possibility ofaccidentally damaging the drive contents. They do this by allowing readcommands to pass but by blocking write commands, hence their name.


There are two ways to build a write-blocker: the blocker can allow allcommands to pass from the computer to the drive except for those thatare on a particular list. Alternatively, the blocker can specificallyblock the write commands and let everything else through.


Write blockers may also include drive protection which will limit thespeed of a drive attached to the blocker. Drives that run at higherspeed work harder (the head moves back and forth more often due to readerrors). This added protection could allow drives that can not be readat high speed (UDMA modes) to be read at the slower modes (PIO).


There are two types of write blockers, Native and Tailgate. A Nativedevice uses the same interface on for both in and out, for example a IDEto IDE write block. A Tailgate device uses one interface for one sideand a different one for the other, for example a Firewire to SATA writeblock.


There are both hardware and software write blockers. Some software writeblockers are designed for a specific operating system. One designed forWindows will not work on Linux. Most hardware write blockers aresoftware independent.


Hardware write blockers can be either IDE-to-IDEor Firewire/USB-to-IDE. Simsonprefers the IDE-to-IDE because they deal better with errors on the driveand make it easier to access special information that is only accessibleover the IDE interface. You may feel differently.


Software write blockers can be either tailored to an individualoperating system or can be an independent boot disk. Their main upsidesare with ease of use, since they are on a CD and do not require you toopen up the case, and speed since they do not become a bottle neck.


Built to interoperate with mobile and e-discovery solutio...[Read More] Description Description Safe Block is the industry standard Windows software write blocker, used by law enforcement and private industry throughout the world, and facilitates the quick and safe acquisition, triage and/or analysis of any disk or flash storage media attached directly to your Windows workstation. It is proven to be safe, and significantly faster than hardware write blocking solutions. 2ff7e9595c


0 views0 comments

Recent Posts

See All

Commentaires


bottom of page