nomadboy.blogg.se

Describe the accessdata ftk imager tool
Describe the accessdata ftk imager tool













describe the accessdata ftk imager tool
  1. Describe the accessdata ftk imager tool install#
  2. Describe the accessdata ftk imager tool free#
  3. Describe the accessdata ftk imager tool windows#

FTK Imager gives us the option to capture the memory of a running system and choose where to store it. In most cases, we should follow the order of volatility, first and foremost target the data that will be removed on system shutdown. We are welcomed by the FTK Imager window and we can start our imaging.įrom here we have multiple options to what we can capture. Inserting our newly configured flash drive in the machine to be imagined, we can navigate to the folder where we copied the tool and run it. It is of vital importance to document extensively everything with do, starting with at what time we insert the flash drive, what exactly we run from the flash drive and when we remove the external device. This means that we need to be very careful about how we image a suspicious machine, so we don't bring too many changes to it and maybe pollute or change the available evidences. entries in the memory for new processes.LNK files will be created the first time we run an application, or updated for consecutive executions.

Describe the accessdata ftk imager tool windows#

the windows registry and the v will be updated with information on the USB device connected.the windows registry is updated with information about any programs installed or ran.Examples of places where the OS will save information about our actions are:

Describe the accessdata ftk imager tool install#

In the case of a Windows OS, any programs we install or run, multiple places will be updated with information about our actions on the machine. An important thing we need to keep in mind is that anything we do on a machine, brings changes to the system we want to image.

  • Copy these files to the folder on the flash device where the FTK Imager executable is located, oor to the root of the removable device.Īfter we have set up our flash device with FTK Imager, we can insert it into the system we would want to image.
  • The MFC files needed are all mfc100*, mfc110*, mfc120* and mfc140* files found in the C:\Windows\System32 folder.
  • For the 64-bit versions of FTK Imager (version 3.4.3 and higher), we need to copy extra files to run, more precisely any Microsoft Foundation Class (MFC) files.
  • Copy the entire "FTK Imager" installation folder (default installation folder is in C:\Program Files\AccessData\FTK Imager or C:\Program Files (x86)\AccessData\FTK Imager) to the usb device.
  • After the installation of the tool is complete, connect the flash drive we want to use into the system.
  • On a machine other than the system we want to image, we need to install FTK Imager.
  • Once we have all the devices we need, we can follow the set-up procedure: Setting up your FTK Imager flash driveįirst of all we need a flash drive on which we can set up the FTK Imager tool and a Windows machine where we can initially install the imagining tool.

    Describe the accessdata ftk imager tool free#

    The FTK Imager tool is easy to use and more importantly, there is a free version. There are different tools available to do this, but the one I most often use is FTK Imager by AccessData.

    describe the accessdata ftk imager tool describe the accessdata ftk imager tool

    Let’s try it.In the process of analyzing a suspicious machine, the first thing we need to do is to actually image the machine we want to investigate. That person can acquire the image and ship it to you and no one will be able to decrypt it, only you. Therefore, it is a safe method to give your public key to a person acquiring an image. He/she will not be able to decrypt it afterwards. A person who has access to the public key is allowed to encrypt the data, but since that person does not have the private key. Thus, only the person can see the saved data who has the private key. In order to decrypt it later, you will need to apply the corresponding private key. In order to encrypt data, you will need the public key. The main idea is that you need to create two keys, one public and one private. Understanding Public Key Infrastructure ( PKI ) is very important and this exercise will help you understand it usage. In that case, you will allow the person acquiring the evidence physical access to the drive, but if you do not want that person to make a copy and later examine the image of the acquired drive, then you’ll need to protect it. In some cases, you will have to collect evidence in a remote site or hire someone to collect the evidence for you.















    Describe the accessdata ftk imager tool