Forensics Beginner Digital Forensics / Disk Imaging / DFIR

FTK Imager � Digital Forensics

A practical guide to FTK Imager � creating forensically sound disk images, browsing evidence, recovering deleted files, exporting artefacts, capturing memory, and verifying integrity.

14 min read Disk Forensics Blue Team / DFIR

// What is FTK Imager?

FTK Imager is a free forensic imaging tool developed by Exterro (formerly AccessData). It creates forensically sound, bit-for-bit copies of storage media � disk images � that can be analysed without touching the original evidence. It also provides a lightweight evidence browser for examining image contents and exporting specific files and artefacts.

FTK Imager is distinct from the full Forensic Toolkit (FTK) product � Imager is free and focused on acquisition, while full FTK is a commercial analysis platform. Imager is the standard tool for creating images that are then analysed in Autopsy, FTK, or other platforms.

FTK Imager is a Windows application. For Linux-based imaging, the equivalent tools are dd or dcfldd (raw images) or ewfacquire for E01 format. When imaging a live Windows system, use FTK Imager's physical drive mode or the portable version (FTK Imager Lite) run directly from a USB drive to avoid installing software on the evidence machine.

// Interface Overview

PanelPurpose
Evidence TreeHierarchical view of all added evidence sources � drives, images, folders
File ListContents of the selected folder in the evidence tree
PropertiesMetadata for the selected file � hash, timestamps, size, physical location
Hex ViewerRaw hex dump of the selected file or sector
Text ViewerDecoded text view � ASCII or Unicode interpretation of raw bytes

// Creating Disk Images

Creating a forensic image is the first step in any DFIR investigation. The image is a sector-by-sector copy of the source � preserving everything including deleted files, unallocated space, and file system metadata.

Imaging a physical drive

Process � FTK Imager
1. File ? Create Disk Image
2. Select source type:
   - Physical Drive    ? full drive including all partitions
   - Logical Drive     ? single partition (e.g. C:\)
   - Image File        ? re-image or convert existing image
   - Contents of a Folder ? logical acquisition (no deleted files)
3. Select the source drive from the dropdown
4. Add a destination image:
   - Choose format (E01 recommended)
   - Set output path on a write-verified evidence drive
   - Fill in case information (case number, examiner, notes)
   - Set fragment size (0 = single file, or 1500MB for manageable chunks)
5. Enable "Verify images after they are created"
6. Start ? monitor progress and hash verification at completion

Write-protect the source. Before connecting a suspect drive, use a hardware write blocker to prevent any writes to the evidence. Software write blockers (Windows registry setting) are a fallback but hardware is preferred � forensic integrity depends on proving the source was not modified.

// Image Formats

FormatExtensionDescriptionBest for
Expert Witness Format.E01Industry standard. Supports compression, metadata, internal hash verification, multi-segment. Default choice for most investigations.Most forensic investigations � widely supported by analysis tools
Raw.dd / .img / .rawUncompressed bit-for-bit copy. No internal metadata. Largest file size but maximum compatibility.When you need compatibility with Linux tools (dd, Autopsy, Volatility)
SMART.s01Compressed format from ASR Data. Similar to E01 but less common.Legacy SMART-based workflows
AFF.affAdvanced Forensic Format � open standard with metadata support. Less commonly used today.Open-source toolchain workflows

// Evidence Browsing

FTK Imager can open and browse disk images without a full analysis tool. Add evidence via File ? Add Evidence Item and select the image file.

Navigating the file system

The Evidence Tree shows the image's partition structure. Expand partitions to see the file system, then navigate directory trees just like Windows Explorer. Key directories to check during investigation:

PathWhat you'll find
C:\Users\{user}\AppData\RoamingApplication data � browser profiles, malware configs, C2 artefacts
C:\Users\{user}\AppData\Local\TempCommon malware drop location
C:\Windows\PrefetchPrefetch files � evidence of program execution even after deletion
C:\Windows\System32\winevt\LogsWindows Event Log files (.evtx) � export for analysis
C:\Windows\System32\TasksScheduled tasks � check for persistence
C:\ProgramDataCommon malware installation directory
C:\Users\{user}\NTUSER.DATUser registry hive � run keys, recently opened files, typed URLs
C:\Windows\System32\configSystem registry hives � SAM, SYSTEM, SOFTWARE, SECURITY

// Recovering Deleted Files

FTK Imager shows deleted files � they appear with a red X icon in the file list. When a file is deleted on NTFS, the directory entry is marked as deleted but the data remains on disk until overwritten. FTK Imager recovers these by parsing the MFT (Master File Table) directly.

Red X � Deleted

File's directory entry is marked deleted. Data may still be intact on disk. Recoverable unless the clusters have been overwritten.

Orphan files

Files whose parent directory has been deleted. Listed under the [orphan] node in the Evidence Tree. Common after attackers delete log directories.

Unallocated space

Sectors not assigned to any active file. May contain remnants of deleted files, previous partitions, or wiped data. Visible as [unallocated space] in the tree.

Recycle Bin

Files deleted via the Recycle Bin are stored in C:\$Recycle.Bin\{SID}\. FTK Imager shows the original path and deletion timestamp.

To export a deleted file: right-click ? Export Files. If the data clusters are intact, you'll get a working copy of the file.

// Exporting Evidence

Export typeHowUse case
Export filesRight-click file or folder ? Export FilesExtract specific files � logs, registry hives, malware samples
Export directory listingFile ? Export Directory ListingGenerate CSV of all files with metadata � useful for timeline analysis
Export hash listFile ? Export File Hash ListGenerate MD5/SHA-1 hashes for all files � compare against known-good baseline
Export custom content imageFile ? Create Custom Content ImageCreate a new image containing only selected files � carve specific artefacts

When extracting Windows Event Logs (.evtx files), registry hives (NTUSER.DAT, SAM, SYSTEM), and prefetch files, hash each exported file immediately after export and log the hash alongside the source path and timestamp in your investigation notes.

// Hash Verification

Forensic integrity is proven through hashing. FTK Imager calculates MD5 and SHA-1 hashes of the source drive and the resulting image � if they match, the image is a verified bit-for-bit copy.

Verify an existing image

FTK Imager
File ? Verify Drive/Image
? Select the image file (.E01, .dd, etc.)
? FTK Imager recalculates the hash and compares to the stored value
? Verified = image has not been modified since acquisition
? Failed = evidence integrity compromised � do not use for legal proceedings

Hashing individual files

FTK Imager � File hash
Select file in file list
? Right-click ? Properties
? MD5 Hash and SHA-1 Hash shown in the Properties panel
? Cross-reference with VirusTotal, threat intel, or known-good hash list

// Memory Capture

FTK Imager can capture a live memory dump from a running Windows system. This is critical � memory contains running processes, network connections, encryption keys, plaintext credentials, and injected code that won't appear in a disk image.

Process � FTK Imager live memory capture
File ? Capture Memory
? Destination path: output to external evidence drive (not the system drive)
? Include pagefile: Yes (recommended � additional volatile data)
? Create AD1 file: optional � wraps the dump with metadata
? Click Capture Memory
? Output: .mem file ? analyse with Volatility or Magnet AXIOM

Memory capture writes to disk. Running FTK Imager on a live system modifies memory � the tool itself loads into RAM and its process appears in the dump. This is unavoidable but acceptable and must be documented. Never install FTK Imager to the suspect's drive � run from USB or a network share.

// Tips & Best Practices

Document everything. Record the time you connected the drive, the write blocker used, the image start and end times, the hash values, and the destination storage device. Forensic reports require this provenance � if you can't prove chain of custody, the evidence may be inadmissible.

Image to a drive larger than the source. An E01 image of a 1TB drive might compress to 200GB depending on data content � but always have more space than the source size in case compression is minimal. Running out of space mid-image corrupts the evidence file.

FTK Imager Lite. The portable version of FTK Imager runs directly from a USB drive without installation. This is the preferred option when imaging a live suspect machine � you avoid installing software to the evidence drive, which would modify timestamps and potentially overwrite deleted data.

E01 vs raw for analysis. E01 images work directly in Autopsy and FTK. For Volatility (memory analysis), you need a raw .mem or .raw dump. When in doubt, create both � convert E01 to raw using FTK Imager's image conversion feature if needed.