1st August 2021

What is DBAN(Darik’s Boot And Nuke)? Deleting Data on Hard Drive with DBAN

DBAN(Darik’s Boot And Nuke) is a freeware that allows you to securely erase data on your hard drive. DBAN works on the command line but is pretty easy to use. All the tool does is replace the data on your hard drive with random data. To use DBAN, you must first download the ISO file from the website and burn it to a boot USB.

Deleting Data on Hard Disk with Example

You can see the disk wiping steps we did in the example below.

1. At first we “boot” the server from the “DBAN CD“.

DBAN CD
DBAN CD

 

2. We pass the first DBAN screen with “Enter”.

DBAN screen
DBAN screen

 

3. It will wait about 10 minutes in the PCI (sysfs) phase.

PCI (sysfs)
PCI (sysfs)

 

Note: If the following error is received, the reason may be deficiencies in the disk connection (Power, SATA / ATA).

The disks have not been wiped-Disk not found
The disks have not been wiped-Disk not found

 

Note: If the following error is received, the reason may be that the disk is corrupt.

Unrecofnized device "/dev/sda"
Unrecofnized device “/dev/sda”

 

4. On the screen that comes up, we select the disk to be deleted with the space key.

select the disk
select the disk

 

5. On the screen that comes up, we select the deletion method with the letter “M”. (DoD Short, Quick Erase etc.)

Deletion method
Deletion method

 

6. On the screen that comes up, we start the disk wiping process with the “F10” key. The estimated remaining time stated in the Statistics section may vary during the process.

Disk wiping process
Disk wiping process

 

Note: In the following situation, the disk wipe could not be completed because one of the disks has bad sectors.

LEARN MORE  Docker Installation on Ubuntu
Disk wipe could not be completed
Disk wipe could not be completed

 

7. Disk wiping with DBAN is completed as follows.

DBAN is completed
DBAN is completed

 

8. We use “WhiteCanyon WipeDrive CD” for the verification and reporting of erased discs. We boot again with the server “WipeDrive” software. In the meantime, a different USB formatted in FAT32 format to be used to save the reports must be plugged into the server. We pass “continue without activation” on the screen below. Activation code may be required in versions after “WipeDrive 8.3.1“. In this case, the code part can be passed by filling it with the letter “A“.

WipeDrive
WipeDrive

 

9. On the screen that comes up, we select the deleted disks and mark “Verify Drive(s)” as the action to be taken.

Select the deleted disks
Select the deleted disks

 

10. We are editing the report format from the “Options -> Log Types and Destinations” section. We specify the report format by selecting the “Pdf File” field from the “Log Types” section. “Include Hardware Details” contains details about the server and there is no need to select it. In order to save the verification report, We select “Save log files to” and “Removable Drive“. The space key can be used. We save with the “Accept Settings” button.

Log Types and Destinations
Log Types and Destinations

 

11. After the configuration processes are completed, we start the verification process with the “Next” button.

Configuration processes
Configuration processes
Configuration processes
Configuration processes

 

12. After the verification process is completed, you can check the media (USB) and files where the reports are saved on another computer.

LEARN MORE  DLL Injection And Process Hollowing Detection in Pest Code Analysis
Verification process is completed
Verification process is completed
Logging Results
Logging Results

 

Leave a Reply

Your email address will not be published. Required fields are marked *