Forensic Toolkit - Wikipedia

Jump to content

Contents

move to sidebar hide
  • (Top)
  • 1 References
  • Article
  • Talk
English
  • Read
  • Edit
  • View history
Tools Tools move to sidebar hide Actions
  • Read
  • Edit
  • View history
General
  • What links here
  • Related changes
  • Upload file
  • Page information
  • Cite this page
  • Get shortened URL
  • Download QR code
Print/export
  • Download as PDF
  • Printable version
In other projects
  • Wikidata item
Appearance move to sidebar hide From Wikipedia, the free encyclopedia Software for computer forensics
Forensic Toolkit
FTK Logo
DeveloperExterro
Stable release8.0 SP2
Operating systemWindows
Available inEnglish
TypeDigital forensics
Websitewww.exterro.com/forensic-toolkit

Forensic Toolkit, or FTK, is computer forensics software originally developed by AccessData, and now owned and actively developed by Exterro. It scans a hard drive looking for various information.[1] It can, for example, potentially locate deleted emails[2] and scan a disk for text strings to use them as a password dictionary to crack encryption.[3]

FTK is also associated with a standalone disk imaging program called FTK Imager. This tool saves an image of a hard disk in one file or in segments that may be later on reconstructed. It calculates MD5 and SHA1 hash values and can verify the integrity of the data imaged is consistent with the created forensic image. The forensic image can be saved in several formats, including DD/raw, E01, and AD1.[4]

References

[edit]
  1. ^ Schneier, Bruce (2007-11-01). "Secure Passwords Keep You Safer". Wired. p. 3. Retrieved 2009-01-12.
  2. ^ Dixon, Phillip D. (December 2005). "An overview of computer forensics" (PDF). IEEE Potentials. 24 (5). IEEE: 8. doi:10.1109/mp.2005.1594001. ISSN 0278-6648. S2CID 25462454. Archived from the original (PDF) on 2016-03-03. Retrieved 2009-01-12.
  3. ^ Casey, Eoghan (Fall 2002). "Practical Approaches to Recovering Encrypted Digital Evidence" (PDF). International Journal of Digital Evidence. 1 (3). Utica, New York: Economic Crime Institute, Utica College: 12. ISSN 1938-0917. Archived from the original (PDF) on 2013-11-02. Retrieved 2009-01-12.
  4. ^ "FTK Imager User Guide v4.3.0" (PDF). January 28, 2020. Archived from the original (PDF) on 2021-04-19. Retrieved 2020-10-08.
[edit]

AccessData Forensic Toolkit (PDF)

  • v
  • t
  • e
Digital forensics
Branches
  • Computer forensics
  • Mobile device forensics
  • Network forensics
  • Database forensics
  • Software forensics
Hardware
  • Forensic disk controller
Software
  • ADF Solutions Digital Evidence Investigator
  • EnCase
  • Foremost
  • FTK
  • PTK Forensics
  • The Sleuth Kit
  • The Coroner's Toolkit
  • COFEE
  • HashKeeper
  • Xplico
Certification
  • Certified Forensic Computer Examiner (CFCE)
  • Global Information Assurance Certification
Processes
  • Digital forensic process
  • Data acquisition
  • Digital evidence
  • eDiscovery
  • Anti–computer forensics
Organisations
  • National Software Reference Library
  • Department of Defense Cyber Crime Center
  • National Hi-Tech Crime Unit (NHTCU)
  • Australian High Tech Crime Centre (AHTCC)
People
  • Mary Aiken
  • Annie Antón
  • Rebecca Bace
  • Josh Brunty
  • Eoghan Casey
  • Hany Farid
  • Simson Garfinkel
  • Clifford Stoll
  • Robert Zeidman
  • Glossary of digital forensics terms
Stub icon

This computer data storage-related software article is a stub. You can help Wikipedia by expanding it.

  • v
  • t
  • e
Retrieved from "https://en.wikipedia.org/w/index.php?title=Forensic_Toolkit&oldid=1330595244" Categories:
  • Computer forensics
  • Digital forensics software
  • Storage software stubs
  • AccessData
Hidden categories:
  • Articles with short description
  • Short description matches Wikidata
  • All stub articles
Search Search Toggle the table of contents Forensic Toolkit 3 languages Add topic

Tag » What Is An Ftk Imager