
This means that we need to be very careful about how we image a suspicious machine, so we don't bring too many changes to it and maybe pollute or change the available evidences.
Accessdata ftk imager 3.4.3 install#
In the case of a Windows OS, any programs we install or run, multiple places will be updated with information about our actions on the machine. An important thing we need to keep in mind is that anything we do on a machine, brings changes to the system we want to image. Copy these files to the folder on the flash device where the FTK Imager executable is located, oor to the root of the removable device.Īfter we have set up our flash device with FTK Imager, we can insert it into the system we would want to image.The MFC files needed are all mfc100*, mfc110*, mfc120* and mfc140* files found in the C:\Windows\System32 folder.For the 64-bit versions of FTK Imager (version 3.4.3 and higher), we need to copy extra files to run, more precisely any Microsoft Foundation Class (MFC) files.Copy the entire "FTK Imager" installation folder (default installation folder is in C:\Program Files\AccessData\FTK Imager or C:\Program Files (x86)\AccessData\FTK Imager) to the usb device.After the installation of the tool is complete, connect the flash drive we want to use into the system.On a machine other than the system we want to image, we need to install FTK Imager.Once we have all the devices we need, we can follow the set-up procedure:

Setting up your FTK Imager flash driveįirst of all we need a flash drive on which we can set up the FTK Imager tool and a Windows machine where we can initially install the imagining tool.
Accessdata ftk imager 3.4.3 free#
The FTK Imager tool is easy to use and more importantly, there is a free version. There are different tools available to do this, but the one I most often use is FTK Imager by AccessData. In the process of analyzing a suspicious machine, the first thing we need to do is to actually image the machine we want to investigate.
