How to safely wipe your data with Dariks Boot and Nuke bootable live CD

Sometimes, we need to completely and irreversibly wipe all data contained in a disk to keep them from falling into the wrong hands. This may not be something we are doing on a day to day basis, but if you want to do it, you should do it right and ensure that the data cannot be recovered by experts. One of the many ways of doing this is through Darik's Boot and Nuke bootable live CD. This tool is made from the same team that develops the professional-grade Blancco data eraser, only it is available for free and without guarantee or support. The reason I like DBaN is because it is very simple to use and does the job fast.

Boot and Nuke

To use DBaN, download the .iso file from the official website and burn it on a CD or USB drive. Then boot from it and you will get a screen with some basic options.

Dariks Boot and Nuke

Press “Enter” to start the software in interactive mode. This will bring you to the next step which is to choose the disk/partition you want to wipe. In the following screenshot, you will only see one disk as I am running this in a Virtual Machine.

Select Disk

If you have more partitions, you can navigate between the entries with “J” and “K” which correspond to up and down, and press “Spacebar” to select which ones you want to wipe. When you're done with this, you may hit “F10” and the wiping process will initiate.

Erase Disk.

Erasing Disk - Succeeded.

Note that if you have followed this standard procedure, DBaN utilized the DoD 5220.22-M methodology to wipe your disks. This however isn't the only way you can erase your data with DBaN.

Data Wiping Methods

While in the main screen, press “F3” to get the list of commands. You may type one of the six commands and press “F1” to continue with the selected data erasing method.

Data Wiping Methods.

Here is an overview of the main data erasing methods and which one is suitable for your purpose.

DoD 5220

This is the default method of choice of DBaN. It basically overwrites all addressable locations in the disk with seven passes of random characters so that the previously contained data isn't recoverable. This is the methodology used by the US Department of Defense, so it is a safe and tested choice for most applications.


This methodology suggests multiple passes of writing zero's and one's in the disk until it finally writes a random character. This ensures that the procedure cannot be reverse-engineered and the wiped data can't be recovered.


The Gutmann method is the one that uses the greater number of passes onto the region to be erased. More specifically, it applies 27 random-order passes and eight passes using random data. For this reason, this choice may take more time compared to the others, but it is generally considered very safe.


This method utilizes a pseudo-random number generator to overwrite the erased region with seemingly random characters. All is done in one-pass, so it is quite quick and safe enough for home and small office use.


This method is simply filling your to be erased disk with zeros. It is the fastest and least safe method, but it will cover most simple purposes.

Data Security Considerations

Whatever way you choose to wipe your data, you should always keep in mind that it may not be enough. This is the reason some agencies wipe their disks with multiple methods instead of just one. Peter Gutmann who devised the Gutmann methodology used by DBaN, has expressed his concerns about his and any other wiping method. According to Gutmann, if sophisticated tools such as magnetic force microscopes are used for image analysis, one can define what the previous values of bits were. And as Leonard Susskind proved through his work, information can never be lost, it's just harder to retrieve it sometimes. Maybe the data in your “securely” wiped disk will be easily read in 2030. Whatever the case, DNaB does the job good enough for now, and while you can never have too much data security, you can't be psychotic about it either.

Share this page:

3 Comment(s)

Add comment


From: Smouch at: 2015-11-17 09:00:27

It has been proven (repeatedly) that reading from a disk that has been zero'd (correctly) will yield absolute garbage.  

No special utilites required, just dd

dd if=/dev/zero of=/DEVICE/PARTITION


From: jelabarre59 at: 2015-11-18 13:02:16

In the end the level of secure wiping comes down to the value of the data on the drive, and the value of the time someone would spend retrieving it.  If your disk has the usual photos and banking information from a home computer, and someone randomly picks it up, it's not going to be worth using something like a "magnetic force microscope" as mentioned above, because the disk has an unknown and likely limited avlue.  Simpler and cheaper to try the next disk to see if it's easier pickings.  So a PRNG or DODshort is likely enough.

However, if you are dealing with a disk likely to contain bank records or confidential/DOD information, that's when the higher-end wipes come into play.  At this point the disk has a high likelyhood of value, and therefore more effort/expense would be put into retrieving wiped information.  Your regular business records are not necessarily this high-value, but doing a full DOD wipe is at least *part* of a "CYA" practice to show you made best efforts to protect customer data.

From: agmo98 at: 2015-11-18 18:43:04

Is this recommended for use with SSD drives?  I heard that it could shorten the usable life of the SSD drive using this.