The 4.3.0 release of FTK Imager includes significant speed improvements in image creation—we've seen the time to image a device cut in half, allowing you to preserve data faster and start the analysis sooner.
Why You Want It
FTK® Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool such as AccessData® Forensic Toolkit® (FTK) is warranted. FTK Imager can also create perfect copies (forensic images) of computer data without making changes to the original evidence.
FTK Imager can create perfect copies, or forensic images of computer data without making changes to the original evidence. The forensic image is identical in every way to the original, including file slack and unallocated space or drive free space. This allows you to store the original media away, safe from harm while the investigation proceeds using the image.
Generate hash reports for regular files and disk images to use as a benchmark to prove the integrity of your case evidence. When a full drive is imaged, a hash generated by FTK Imager can be used to verify that the image hash and the drive hash match after the image is created, and that the image has remained unchanged since acquisition.
Capabilities To Empower You
- Create forensic images of local hard drives, CDs and DVDs, thumb drives or other USB devices, entire folders, or individual files from various places within the media.
- Preview files and folders on local hard drives, network drives, CDs and DVDs, thumb drives or other USB devices.
- Preview the contents of forensic images stored on the local machine or on a network drive.
- Mount an image for a read-only view that leverages Windows® Internet Explorer® to see the content of the image exactly as the user saw it on the original drive.
- Export files and folders from forensic images.
- See and recover files that have been deleted from the Recycle Bin, but have not yet been overwritten on the drive.
- Create hashes of files to check the integrity of the data by using either of the two hash functions available in FTK Imager: Message Digest 5 (MD5) and Secure Hash Algorithm (SHA-1).
- With 4.3 you can also capture and view APFS images from Mac® hard drives. You only need one tool for all operating systems.
What Clients Are Saying
approach to improving how you collect, analyze and use data.