Forensic imaging tools

Dr. Richard Adams
Dr. Richard AdamsVice President um XtremeForensics
A high-level review of acquisition times for several
popular imaging tools
Background
There has been a lot of anecdotal
discussion regarding the relative
performance of various popular acquisition
tools. This document provides an overview
of some research currently being
undertaken. Once completed the full set of
detailed results will be published.
Tools Assessed
 EnCase Forensic Imager v7.06
 FTK Imager v3.1.2
 Adepto v2.1 (Helix3)
 EnCase LineN v6.12.0.21
 IXImager v3
 Raptor v2.5
 X-Ways v17.1
Speed Assessment Parameters
Each of the acquisition tools used in this research was placed
into one of two categories and measured for how quickly the tool
could acquire a 160GB virtual drive. The categories were:
 ‘Standalone’ – meaning the tool comes with its own bootable
environment
 ‘Dependant’ – meaning the tool itself is not part of a bootable
environment and requires a third-party write-blocking device
or bootable system.
Within each category the tools were tested in the same virtual
configuration. The default image type was selected together with
the fastest compression (if available).
‘Standalone’ Acquisition Tool
Environment
VIRTUAL
MACHINE
(VirtualBox)
VDI
(VIRTUAL
SOURCE DISK)
VDI
(VIRTUAL
TARGET DISK)
VIRTUAL
BOOT
CDROM
ISO
SATA
SATA
PHYSICAL DISK 1
PHYSICAL DISK 2
PHYSICAL DISK
3
SATA
‘Dependant’ Acquisition Tool
Environment
VIRTUAL
MACHINE
(VirtualBox)
VDI
(VIRTUAL
SOURCE DISK)
VDI
(VIRTUAL
TARGET DISK)
SATA
SATA
PHYSICAL DISK 1
PHYSICAL DISK 2
SATA
VDI
(VIRTUAL SYSTEM
DISK)
WIN 7 SP1
PHYSICAL DISK 3
Overall Results
Tool Time to acquire 160GB Image
Size
Image
type
IXImager 17 mins 78.6 GB ASB
Xways Forensic 27 mins 74.4 GB E01
FTKI 50 mins 68.3 GB E01
Adepto 56 mins 149 GB RAW
EnCase Linen 63 mins 149 GB E01
Raptor 69 mins 68.3 GB E01
EnCase Forensic Imager 74 mins 68.6 GB E01
Standalone Tool Results
For tools that don’t require a write-blocker as part of
the acquisition process
Tool Time to acquire 160 GB Image size Image
type
IXImager 17 mins 78.6 GB ASB
Adepto 56 mins 149 GB RAW
EnCase LineN 1hr 03 mins 149 GB E01
Raptor 1hr 09 mins 68.3 GB E01
Dependant Tool Results
For tools that require a write-blocker as part of
the acquisition process
Tool Time to acquire 160 GB Image
size
Image type
X-Ways Forensic 27 mins 74.4 GB E01
FTK Imager 50 mins 68.3GB E01
EnCase Forensic Imager 1hr 14 mins 68.6 GB E01
Scalability Assessment
The tools were grouped by their ability to
accommodate being deployed in an
environment containing multiple source
devices. Two groups were identified:
 Unrestricted
 Restricted
Unrestricted tools
Tool Comment
IXImager Unlimited number of concurrent
acquisitions, one analysis licence
required
Raptor Unlimited number of concurrent
acquisitions, no licence required
EnCase LineN Unlimited number of concurrent
acquisitions, no licence required
Adepto Unlimited number of concurrent
acquisitions, no licence required
Restricted tools
Tool Comment
FTK Imager Requires write-blocker per concurrent
acquisition
EnCase Forensic Imager Requires write-blocker per concurrent
acquisition
X-Ways Requires write-blocker per concurrent
acquisition, requires dongle per
concurrent acquisition
1 von 12

Recomendados

03 Data Recovery - Notes von
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
11.5K views9 Folien
Module 02 ftk imager von
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imagerParminderKaurBScHons
1K views36 Folien
05 Duplication and Preservation of Digital evidence - Notes von
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
7.4K views7 Folien
Data recovery von
Data recoveryData recovery
Data recoveryMir Majid
5.9K views27 Folien
Mobile Forensics von
Mobile ForensicsMobile Forensics
Mobile Forensicsprimeteacher32
8.6K views14 Folien
Virtual Machine Forensics von
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensicsprimeteacher32
8.3K views13 Folien

Más contenido relacionado

Was ist angesagt?

Data recovery von
Data recoveryData recovery
Data recoverybhaumik_c
2.2K views17 Folien
CNIT 121: 8 Forensic Duplication von
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationSam Bowne
3.5K views40 Folien
Digital forensics von
Digital forensics Digital forensics
Digital forensics vishnuv43
2.5K views30 Folien
01 Computer Forensics Fundamentals - Notes von
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
18.8K views6 Folien
Data Acquisition von
Data AcquisitionData Acquisition
Data Acquisitionprimeteacher32
17.9K views22 Folien
Digital forensic tools von
Digital forensic toolsDigital forensic tools
Digital forensic toolsParsons Corporation
952 views14 Folien

Was ist angesagt?(20)

Data recovery von bhaumik_c
Data recoveryData recovery
Data recovery
bhaumik_c2.2K views
CNIT 121: 8 Forensic Duplication von Sam Bowne
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne3.5K views
Digital forensics von vishnuv43
Digital forensics Digital forensics
Digital forensics
vishnuv432.5K views
01 Computer Forensics Fundamentals - Notes von Kranthi
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi 18.8K views
computer forensic tools-Hardware & Software tools von N.Jagadish Kumar
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
N.Jagadish Kumar 31.3K views
Encase Forensic von Megha Sahu
Encase ForensicEncase Forensic
Encase Forensic
Megha Sahu3.5K views
Processing Crimes and Incident Scenes von primeteacher32
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
primeteacher327.6K views
Computer forensics toolkit von Milap Oza
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza6.8K views
Digital Forensic: Brief Intro & Research Challenge von Aung Thu Rha Hein
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Preserving and recovering digital evidence von Online
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
Online 8.5K views

Destacado

пр Модель зрелости Dlp von
пр Модель зрелости Dlpпр Модель зрелости Dlp
пр Модель зрелости DlpAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
8.3K views36 Folien
Модель зрелости процесса (мониторинг и оценка ИБ) von
Модель зрелости процесса (мониторинг и оценка ИБ) Модель зрелости процесса (мониторинг и оценка ИБ)
Модель зрелости процесса (мониторинг и оценка ИБ) Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
9.5K views6 Folien
пр про SOC для ФСТЭК von
пр про SOC для ФСТЭКпр про SOC для ФСТЭК
пр про SOC для ФСТЭКAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
16.9K views20 Folien
пр Спроси эксперта про прогнозы ИБ von
пр Спроси эксперта про прогнозы ИБпр Спроси эксперта про прогнозы ИБ
пр Спроси эксперта про прогнозы ИБAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
23.6K views45 Folien
Болевые точки корпоративной сети: взгляд не со стороны службы ИБ von
Болевые точки корпоративной сети: взгляд не со стороны службы ИББолевые точки корпоративной сети: взгляд не со стороны службы ИБ
Болевые точки корпоративной сети: взгляд не со стороны службы ИБAleksey Lukatskiy
10K views42 Folien
пр Куда идет ИБ в России? (региональные аспекты) von
пр Куда идет ИБ в России? (региональные аспекты)пр Куда идет ИБ в России? (региональные аспекты)
пр Куда идет ИБ в России? (региональные аспекты)Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
20.9K views23 Folien

Destacado(20)

Болевые точки корпоративной сети: взгляд не со стороны службы ИБ von Aleksey Lukatskiy
Болевые точки корпоративной сети: взгляд не со стороны службы ИББолевые точки корпоративной сети: взгляд не со стороны службы ИБ
Болевые точки корпоративной сети: взгляд не со стороны службы ИБ
Aleksey Lukatskiy10K views
Анализ защищенности ПО и инфраструктур – подходы и результаты von Advanced monitoring
Анализ защищенности ПО и инфраструктур – подходы и результатыАнализ защищенности ПО и инфраструктур – подходы и результаты
Анализ защищенности ПО и инфраструктур – подходы и результаты
Проблемы безопасной разработки и поддержки импортных средств защиты информации von Aleksey Lukatskiy
Проблемы безопасной разработки и поддержки импортных средств защиты информацииПроблемы безопасной разработки и поддержки импортных средств защиты информации
Проблемы безопасной разработки и поддержки импортных средств защиты информации
Aleksey Lukatskiy3.8K views
Fusing digital forensics, electronic discovery and incident response von Dr. Richard Adams
Fusing digital forensics, electronic discovery and incident responseFusing digital forensics, electronic discovery and incident response
Fusing digital forensics, electronic discovery and incident response
Dr. Richard Adams980 views
Опыт подготовки к CRISC/цикл мастер-классов по программам сертификации ISACA von RISClubSPb
Опыт подготовки к CRISC/цикл мастер-классов по программам сертификации ISACAОпыт подготовки к CRISC/цикл мастер-классов по программам сертификации ISACA
Опыт подготовки к CRISC/цикл мастер-классов по программам сертификации ISACA
RISClubSPb867 views
Опыт подготовки к CISA/цикл мастер-классов по программам сертификации ISACA von RISClubSPb
Опыт подготовки к CISA/цикл мастер-классов по программам сертификации ISACAОпыт подготовки к CISA/цикл мастер-классов по программам сертификации ISACA
Опыт подготовки к CISA/цикл мастер-классов по программам сертификации ISACA
RISClubSPb1.3K views
Повышение осведомленности пользователей по вопросам ИБ/очный семинар RISC von RISClubSPb
Повышение осведомленности пользователей по вопросам  ИБ/очный семинар RISCПовышение осведомленности пользователей по вопросам  ИБ/очный семинар RISC
Повышение осведомленности пользователей по вопросам ИБ/очный семинар RISC
RISClubSPb3.4K views

Similar a Forensic imaging tools

You suck at Memory Analysis von
You suck at Memory AnalysisYou suck at Memory Analysis
You suck at Memory AnalysisFrancisco Ribeiro
7.3K views116 Folien
Becoming a kinect hacker innovator v2 von
Becoming a kinect hacker innovator v2Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2Jeff Sipko
2.5K views58 Folien
CSIA 310 Cybersecurity Processes & TechnologiesLab Activity #3.docx von
CSIA 310 Cybersecurity Processes & TechnologiesLab Activity #3.docxCSIA 310 Cybersecurity Processes & TechnologiesLab Activity #3.docx
CSIA 310 Cybersecurity Processes & TechnologiesLab Activity #3.docxannettsparrow
3 views8 Folien
Kinect von
KinectKinect
Kinect은석 김은석
570 views15 Folien
Kinect von
KinectKinect
Kinect은석 김은석
507 views15 Folien
Voice Assistance Based Remote Surveillance System von
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemIRJET Journal
9 views6 Folien

Similar a Forensic imaging tools (20)

Becoming a kinect hacker innovator v2 von Jeff Sipko
Becoming a kinect hacker innovator v2Becoming a kinect hacker innovator v2
Becoming a kinect hacker innovator v2
Jeff Sipko2.5K views
CSIA 310 Cybersecurity Processes & TechnologiesLab Activity #3.docx von annettsparrow
CSIA 310 Cybersecurity Processes & TechnologiesLab Activity #3.docxCSIA 310 Cybersecurity Processes & TechnologiesLab Activity #3.docx
CSIA 310 Cybersecurity Processes & TechnologiesLab Activity #3.docx
annettsparrow3 views
Voice Assistance Based Remote Surveillance System von IRJET Journal
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
IRJET Journal9 views
Real Time Object Dectection using machine learning von pratik pratyay
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
pratik pratyay750 views
Reproducibility in artificial intelligence von Carlos Toxtli
Reproducibility in artificial intelligenceReproducibility in artificial intelligence
Reproducibility in artificial intelligence
Carlos Toxtli779 views
Picture Recovery Software:- Retrieves all lost and deleted digital Photos von Alisa Smith
Picture Recovery Software:- Retrieves all lost and deleted digital PhotosPicture Recovery Software:- Retrieves all lost and deleted digital Photos
Picture Recovery Software:- Retrieves all lost and deleted digital Photos
Alisa Smith335 views
Digital Forensic Tools - Application Specific. von guestcf6f5b
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.
guestcf6f5b344 views
Digital Forensic tools - Application Specific von ideaflashed
Digital Forensic tools - Application SpecificDigital Forensic tools - Application Specific
Digital Forensic tools - Application Specific
ideaflashed1.8K views
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A... von CODE BLUE
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
CODE BLUE108 views
Technical portfolio 15 opteng no backlink von James
Technical portfolio 15 opteng no backlinkTechnical portfolio 15 opteng no backlink
Technical portfolio 15 opteng no backlink
James 288 views
Presentation for min project von araya kiros
Presentation for min projectPresentation for min project
Presentation for min project
araya kiros156 views
Sanger, upcoming Openstack for Bio-informaticians von Peter Clapham
Sanger, upcoming Openstack for Bio-informaticiansSanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticians
Peter Clapham271 views

Último

PRODUCT PRESENTATION.pptx von
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptxangelicacueva6
14 views1 Folie
Transcript: The Details of Description Techniques tips and tangents on altern... von
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...BookNet Canada
136 views15 Folien
handbook for web 3 adoption.pdf von
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
22 views16 Folien
Kyo - Functional Scala 2023.pdf von
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
368 views92 Folien
Serverless computing with Google Cloud (2023-24) von
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)wesley chun
11 views33 Folien
Unit 1_Lecture 2_Physical Design of IoT.pdf von
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfStephenTec
12 views36 Folien

Último(20)

Transcript: The Details of Description Techniques tips and tangents on altern... von BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada136 views
handbook for web 3 adoption.pdf von Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views
Serverless computing with Google Cloud (2023-24) von wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
Unit 1_Lecture 2_Physical Design of IoT.pdf von StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
STPI OctaNE CoE Brochure.pdf von madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
Voice Logger - Telephony Integration Solution at Aegis von Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
Five Things You SHOULD Know About Postman von Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman33 views
Case Study Copenhagen Energy and Business Central.pdf von Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
Data Integrity for Banking and Financial Services von Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely21 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf von Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Empathic Computing: Delivering the Potential of the Metaverse von Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst478 views

Forensic imaging tools

  • 1. A high-level review of acquisition times for several popular imaging tools
  • 2. Background There has been a lot of anecdotal discussion regarding the relative performance of various popular acquisition tools. This document provides an overview of some research currently being undertaken. Once completed the full set of detailed results will be published.
  • 3. Tools Assessed  EnCase Forensic Imager v7.06  FTK Imager v3.1.2  Adepto v2.1 (Helix3)  EnCase LineN v6.12.0.21  IXImager v3  Raptor v2.5  X-Ways v17.1
  • 4. Speed Assessment Parameters Each of the acquisition tools used in this research was placed into one of two categories and measured for how quickly the tool could acquire a 160GB virtual drive. The categories were:  ‘Standalone’ – meaning the tool comes with its own bootable environment  ‘Dependant’ – meaning the tool itself is not part of a bootable environment and requires a third-party write-blocking device or bootable system. Within each category the tools were tested in the same virtual configuration. The default image type was selected together with the fastest compression (if available).
  • 5. ‘Standalone’ Acquisition Tool Environment VIRTUAL MACHINE (VirtualBox) VDI (VIRTUAL SOURCE DISK) VDI (VIRTUAL TARGET DISK) VIRTUAL BOOT CDROM ISO SATA SATA PHYSICAL DISK 1 PHYSICAL DISK 2 PHYSICAL DISK 3 SATA
  • 6. ‘Dependant’ Acquisition Tool Environment VIRTUAL MACHINE (VirtualBox) VDI (VIRTUAL SOURCE DISK) VDI (VIRTUAL TARGET DISK) SATA SATA PHYSICAL DISK 1 PHYSICAL DISK 2 SATA VDI (VIRTUAL SYSTEM DISK) WIN 7 SP1 PHYSICAL DISK 3
  • 7. Overall Results Tool Time to acquire 160GB Image Size Image type IXImager 17 mins 78.6 GB ASB Xways Forensic 27 mins 74.4 GB E01 FTKI 50 mins 68.3 GB E01 Adepto 56 mins 149 GB RAW EnCase Linen 63 mins 149 GB E01 Raptor 69 mins 68.3 GB E01 EnCase Forensic Imager 74 mins 68.6 GB E01
  • 8. Standalone Tool Results For tools that don’t require a write-blocker as part of the acquisition process Tool Time to acquire 160 GB Image size Image type IXImager 17 mins 78.6 GB ASB Adepto 56 mins 149 GB RAW EnCase LineN 1hr 03 mins 149 GB E01 Raptor 1hr 09 mins 68.3 GB E01
  • 9. Dependant Tool Results For tools that require a write-blocker as part of the acquisition process Tool Time to acquire 160 GB Image size Image type X-Ways Forensic 27 mins 74.4 GB E01 FTK Imager 50 mins 68.3GB E01 EnCase Forensic Imager 1hr 14 mins 68.6 GB E01
  • 10. Scalability Assessment The tools were grouped by their ability to accommodate being deployed in an environment containing multiple source devices. Two groups were identified:  Unrestricted  Restricted
  • 11. Unrestricted tools Tool Comment IXImager Unlimited number of concurrent acquisitions, one analysis licence required Raptor Unlimited number of concurrent acquisitions, no licence required EnCase LineN Unlimited number of concurrent acquisitions, no licence required Adepto Unlimited number of concurrent acquisitions, no licence required
  • 12. Restricted tools Tool Comment FTK Imager Requires write-blocker per concurrent acquisition EnCase Forensic Imager Requires write-blocker per concurrent acquisition X-Ways Requires write-blocker per concurrent acquisition, requires dongle per concurrent acquisition