Linux How To Clone One System Harddrive to another remote system

The easiest way is to use SSH and DD or a combination of netcat.  SSH will be a little slower due to encryption but is the most secure way (on two older systems the average clone speed is about 40-50MB/s).  This is also OS independent as it doesn't matter what the source OS is because you are literallly cloning the drive so you retain the partition table and settings.


 

Clone HDD using SSH and DD

dd if=/dev/sourcedrive | ssh user@yourhostname.com "dd of=/dev/destinationdrive"

However especially in Linux you'll want to do a fsck on all partitions on the remote drive or it probably won't boot because the filesystem recognizes the partitions are not right due to the different drive sizes. More info here.

Note you will need to use sudo or root on both systems.  I also like to use a live CD/USB/Network on the remote system so that the operation can completely cleanly (especially helpful if that would be the only disk device on the remote system).

 


 

 

Clone HDD using netcat (nc)

 

This is the faster but less secure way someone could accidentally or maliciously send random/wrong data to the remote nc causing corruption.  There is of course the risk of eavesdropping where an attacker could essentially have a copy of your cloned hard drive too.

First setup the remote server.

Remote Server Setup

nc -l 29000|dd of=/dev/destinationdrive

This tells nc to listen on port 29000 and write the data to /dev/destinationdrive

Now we are ready to push the source drive from the source server.

Source Server

dd if=/dev/sourcedrive| nc remoteserver 29000

This tells dd to take data from /dev/sourcedrive and send it to an nc server at remoteserver on port 29000


Tags:

linux, clone, harddrive, systemthe, easiest, ssh, dd, netcat, slower, encryption, mb, os, doesn, literallly, cloning, retain, partition, settings, hdd, dev, sourcedrive, user, yourhostname, quot, destinationdrive, ll, fsck, partitions, filesystem, recognizes, sizes, info, sudo, usb, cleanly, disk, nc, maliciously, corruption, eavesdropping, attacker, essentially, cloned, server, remoteserver,

Latest Articles

  • Cisco Switches How To Get Of Port Line Status Console Messages
  • Cisco DHCP Snooping Relay Setup Information
  • Cisco Switch Setup Guide Command List
  • Cisco 2960 Switch Reset To Factory Defaults
  • How To Boot Cisco CUCM UCSInstall 8.6, 10, 11 and 12 on KVM/Proxmox
  • VBOX VirtualBox How To Import Raw .img Disk File
  • Windows Server 2012, 2016, 2019 How To Install and Missing Disabled Telnet Client
  • proxmox vm networking breaks when you restart your network on the hostnode
  • Linux ln symlink how to update existing symbolic link
  • Ubuntu 18.04 / Linux Mint 19.1 Cannot Type or Login - solution
  • LUKS Hard Drive Encryption on Linux Mint Ubuntu Debian etc how to mount encrypted hard drive
  • How to use nmap locate other machines/computers/servers on your network using nmap
  • Linux Mint 18.2 Create Config File To Start Application Upon Login
  • Dell Wyse Thin Client BIOS Access Key
  • sudoers file in /etc warning about comments/includes!
  • Centos 7 Reallocate logical volume space to another
  • lvm how to reduce volume size
  • letsencrypt certbot error "Unable to find a virtual host listening on port 80 which is currently needed for Certbot to prove to the CA that you control your domain. Please add a virtual host for port 80."
  • SSH error cannot Forward or Listen "bind: Cannot assign requested address"
  • X11 SSH Linux Forwarding Error