


It is of vital importance to document extensively everything with do, starting with at what time we insert the flash drive, what exactly we run from the flash drive and when we remove the external device. This means that we need to be very careful about how we image a suspicious machine, so we don't bring too many changes to it and maybe pollute or change the available evidences. entries in the memory for new processes.LNK files will be created the first time we run an application, or updated for consecutive executions.the windows registry and the v will be updated with information on the USB device connected.the windows registry is updated with information about any programs installed or ran.Examples of places where the OS will save information about our actions are:
Accessdata ftk imager install#
In the case of a Windows OS, any programs we install or run, multiple places will be updated with information about our actions on the machine. An important thing we need to keep in mind is that anything we do on a machine, brings changes to the system we want to image.

On a machine other than the system we want to image, we need to install FTK Imager.Once we have all the devices we need, we can follow the set-up procedure: Setting up your FTK Imager flash driveįirst of all we need a flash drive on which we can set up the FTK Imager tool and a Windows machine where we can initially install the imagining tool.
Accessdata ftk imager free#
The FTK Imager tool is easy to use and more importantly, there is a free version. There are different tools available to do this, but the one I most often use is FTK Imager by AccessData. In the process of analyzing a suspicious machine, the first thing we need to do is to actually image the machine we want to investigate.
