Custom Image Using FTK and Mounting Image for Analysis
Forensic Acquisition and Analysis Using FTK Imager
FTK Imager is an essential tool for targeted forensic data acquisition and efficient analysis. Below is a detailed guide on how to use it for creating and analyzing custom images.
1. Custom Image Creation Using FTK Imager
Step 1: Launch FTK Imager as Administrator
Why? Ensures access to all system files, including protected or locked files.
How? Right-click the FTK Imager icon and select Run as Administrator.
Step 2: Add Evidence Item
Navigate to File > Add Evidence Item.
Choose the source type based on your investigation:
Physical Drive: Acquires the entire disk, including unallocated space.
Logical Drive: Captures only allocated space (e.g., active files).
Image File: Load previously captured forensic images.
Contents of a Folder: Focus on specific folders for targeted acquisition.
Step 3: Select Evidence Source
Select the desired drive or folder:
Example: Choose *C:* for logical drive acquisition on Windows systems.
Step 4: Navigate and Add Files/Folders
Expand the evidence tree, such as NONAME [NTFS] > root.
Right-click critical items and select Add to Custom Content Image:
Documents, Downloads, Desktop.
Event logs:
%SYSTEMROOT%\System32\winevt\Logs\
Registry hives:
%SYSTEMROOT%\config\
PowerShell scripts or other specific files.
Step 5: Create Custom Image
Click Create Image.
Set:
Destination Path: Where the image will be saved.
Image Filename: A descriptive name for easy identification.
Enable:
Verify images after they are created.
Create directory listings for report generation.
Click Start to begin the imaging process.
Step 6: Verify Completion
FTK Imager calculates and displays hash values to verify data integrity.
The custom image is now ready for analysis.
Benefits of Mounting Images
Interactive Analysis:
View and analyze the data in a user-friendly manner.
Directly access critical forensic artifacts without altering the original image.
Triage Investigations:
Quickly locate and analyze key files such as event logs and registry entries.
Efficient Workflow:
Reduces time spent on acquisition and allows focused investigations.
Key Considerations
Data Integrity:
Hash the image post-acquisition using MD5 or SHA-256 to ensure no data is altered.
Storage Requirements:
Ensure sufficient space for storing images, as even custom images can be large depending on the selected files.
Evidence Isolation:
Always perform analysis on a dedicated forensic workstation to avoid evidence tampering.
Key Points
FTK Imager provides a powerful and flexible method for forensic acquisition and analysis. By creating custom images and mounting them for interactive review, investigators can efficiently gather and analyze evidence, ensuring both thoroughness and speed during incident response.
Last updated