SANS Institute - FTK Imager: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Updated description via script) Tag: Reverted |
(Updated via script) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
=Description=<br> | =Description= | ||
FTK Imager is a digital forensics tool used for acquiring and extracting data from digital media. FTK Imager can be used to connect to a live system and acquire data in a forensically sound manner, or to collect data from a system that has been powered down. FTK Imager can also be used to create disk images, which can be used for analysis or for creating a bootable environment for forensic analysis.=More Information= | <br> | ||
FTK Imager is a digital forensics tool used for acquiring and extracting data from digital media. FTK Imager can be used to connect to a live system and acquire data in a forensically sound manner, or to collect data from a system that has been powered down. FTK Imager can also be used to create disk images, which can be used for analysis or for creating a bootable environment for forensic analysis. | |||
<br> | |||
=More Information= | |||
<br> | <br> | ||
https://accessdata.com/product-download/ftk-imager | https://accessdata.com/product-download/ftk-imager | ||
[[Category:Incident Reporting & Recovery]] | [[Category:Incident Reporting & Recovery]] |
Latest revision as of 02:56, 24 April 2024
Description
FTK Imager is a digital forensics tool used for acquiring and extracting data from digital media. FTK Imager can be used to connect to a live system and acquire data in a forensically sound manner, or to collect data from a system that has been powered down. FTK Imager can also be used to create disk images, which can be used for analysis or for creating a bootable environment for forensic analysis.