Forensic Toolkit (FTK) Digital Intelligence- AccessData

What is Forensic Toolkit (FTK) - AccessData

Forensic Toolkit, or FTK, is a Computer Forensics Software made by AccessData. It scans a hard drive looking for various information It can, for example, locate deleted emails and scan a disk for text strings to use them as a password dictionary to crack encryption.

Forensic Toolkit (FTK) - Digital Intelligence - AccessData
The Forensic Toolkit (FTK) also includes a standalone disk imaging program called FTK Imager. The FTK Imager is a simple but concise tool. It saves an image of a hard disk in one file or in segments that may be later on reconstructed. It calculates MD5 hash values and confirms the integrity of the data before closing the files. The result is an image file(s) that can be saved in several formats, including DD raw.


Why You Want Access Data Forensic Toolkit (FTK)

Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis speed with FTK®, the purpose-built solution that inter-operates with mobile device and e-discovery technology. Powerful and proven, AccessData'S Forensic Toolkit (FTK) processes and indexes data upfront, eliminating wasted time waiting for searches to execute. No matter how many different data sources you’re dealing with or the amount of data you have to cull through, FTK gets you there quicker and better than anything else.


UNMATCHED SPEED AND STABILITY
FTK uses distributed processing and is the only forensics solution to fully leverage multi-thread/multi-core computers. While other forensics tools waste the potential of modern hardware solutions, Forensic Toolkit (FTK) - AccessData uses 100 percent of its hardware resources, helping investigators find relevant evidence faster.


FASTER SEARCHING
Since indexing is done up front, filtering and searching are completed more efficiently than with any other solution. Whether you’re investigating or performing document review, you have a shared index file, eliminating the need to recreate or duplicate files.


DATABASE DRIVEN
FTK is truly database driven, using one shared case database. All data is stored securely and centrally, allowing your teams to use the same data. This reduces the cost and complexity of creating multiple data sets.

Forensics Software Company India's  Capabilities

  • Unique distributed processing, which cuts processing time and reduces case backlog.
  • FTK processes and indexes up front so you don’t waste time waiting for searches to execute, helping you to zero in on relevant evidence faster, and dramatically increasing analysis speed.
  • Leverages one shared case database, allowing teams to use the same data, reducing cost and complexity of creating multiple case datasets.
  • While other products run out of memory and crash during processing, FTK is database driven, providing the stability necessary to handle large data.
  • The easy-to-use GUI provides a faster learning experience.
  • Visualization technology that displays your data in timelines, cluster graphs, pie charts, Geo-location and more, helps you get a clearer picture of events.


Add On These Features To Enhance The Power of FTK -AccessData Forensic Software


AccessData has developed other industry-leading solutions to assist in password recovery. These solutions are used in many different environments to provide specific, password-cracking related functions. Law enforcement and corporate security professionals performing computer forensic investigations, utilize these solutions to access password-protected files. Likewise, administrators can also utilize these solutions to recover system passwords, lost personal passwords and more. AccessData’s Password Recovery Toolkit® (PRTK®) and Distributed Network Attack® (DNA®) provide access to passwords for a large number of popular software applications. PRTK runs on a single machine only. DNA uses multiple machines across the network or across the world to conduct key space and dictionary attacks.

Rainbow (Hash) Tables
Rainbow Tables are pre-computed, brute-force attacks. In cryptography, a brute-force attack is an attempt to recover a cryptographic key or password by trying every possible key combination until the correct one is found. How quickly this can be done depends on the size of the key, and the computing resources applied. A system set at 40-bit encryption has one trillion keys available. A brute-force attack of 500,000 keys per second would take approximately 25 days to exhaust the key space combinations using a single 3 GHz Pentium 4 computer. With a Rainbow Table, because all possible keys in the 40-bit keyspace are already calculated, file keys are found in a matter of seconds to minutes; far faster than by other means. DNA and PRTK seamlessly integrate with Rainbow Tables.

Portable Office Rainbow Tables (PORT)
AccessData Portable Office Rainbow Tables (PORT) are different from the full Hash tables set. A statistical analysis is done on the file itself to determine the available keys. This takes far less space than the Hash Tables, but also takes somewhat more time and costs a small percentage in accuracy.

Let’s Get Started
Forensic Toolkit (FTK) leverages multi-machine processing capabilities, cutting case processing times more than 400% vs. leading competitors, reducing case backlog significantly; it performs comprehensive processing upfront greatly increasing the speed with which an examiner can focus on the actual investigation.

No comments:

Post a Comment