FTK Imager
Purpose: To introduce some of the FTK Imager features which include some of the core functions related to acquiring case evidence.
Application location: Virtual Computing Lab
Preparation: Review user guide and lab video/slides (on Blackboard)
Evidence file: Washer.E01 file (located in \\144.175.196.12\Forensic Data\Washer.E01)
Questions to answer:
- Who was the examiner for this drive and what software was used to acquire this image?
- How many sectors are on this drive?
- What is the volume serial number for the WASHER volume?
- When was the [root] directory created? Provide the full timestamp.
- What is the file system and operating system of Partition 1?
- What is the purpose of the pagefile.sys file?
- What is the starting cluster for the pagefile.sys file?
- What is the Master File Table (MFT)? Why is it important?
- What is the MFT record number of the MFT?
- What is the MFT record number for the WINDOWS directory?
- Convert Washer.E01 into the AFF format. Password protect the image with the password “password123”. Save it on the desktop and call it <lastname>Washer. Put your last name in place of <lastname>. Insert a picture of the new file(s) using the Snipping Tool.
- Load the new image into FTK Imager to verify that the password is set. Insert a picture of the window asking for the password using the Snipping Tool.
- Mount the Washer.E01 image. Attach a picture of the hard disk drives connected to the computer showing the mounted image. Unmount the image.