

Perhaps time to capture evidence is limited.

Now, I’m not saying FTK Imager is about to answer either of those questions for you but there are some handy functions which I had never used until recently.Ĭustom content images in FTK Imager allow the analyst to add an evidence item and build a logical image (AD1… sorry XWF users) containing only files of their choosing. Whether it’s management in Law Enforcement looking for the silver bullet ‘Find Evidence’ button in Axiom (no digs at Magnet but please put that back in :)) or the large corporations incident responder needing to analyse hundreds of endpoints for one specific artefact. This is mainly due to the issue that most units have backlogs, lack of time and urgency to produce results. Quick!Īs we all know, things have moved on quite rapidly from grabbing an image of a dead box and leaving it processing in your tool of choice over the weekend. Modern day forensics and IR require answers. While working in law enforcement I was always obsessed with ensuring I had captured the ‘golden forensic image’ which for obvious reasons, is still ideal and gives you all that unallocated spacey goodness. There has been atleast one report on the X-Ways forum that this feature does not work, so it may not work for all configurations of bitlocker.FTK Imager is renowned the world over as the go-to forensic imaging tool. Both existing and deleted files were available within X-Ways after processing. In at least one instance, I was able to add C: drive (not the physical disk, just the partition) and create an image that could in turn be processed by X-Ways. X-Ways support states that this should work. X-Ways support states this is not supported. This was not attempted, but it seems reasonable to assume this will collect unencrypted files. Note that the phrase "logical" here corresponds directly with FTK Imagers use of the term in their image acquire menu. I was able to add a partition and create an image in which the data was unencrypted. Note that the phrase "physical" here corresponds directly with FTK Imagers use of the term in their image acquire menu. Using FTK Imager lite, it was determined a live image of the physical system disk resulted in an image with an encrypted bitlocker container on it. Live imaging FTK Lite Imaging of a physical drive

Make sure the destination you select for your new image does not exist. You will be presented a dialog window to enter new information about the image.
Ftk imager lite password#
The recovery password can be recovered from a BitLocker enabled computer provided it can be logged into e.g. EnCase does not accept the recovery password if there is trailing white space. Note that there is no white space in the recovery password including not at the end, e.g.
Ftk imager lite Offline#
Multiple options to offline decrypt the information, provided the password or recovery password is available, are available.

One can make an offline image with the image containing encrypted information. There are multiple ways to image a computer with BitLocker security in place, namely:
