How To Use FTK Imager To Take Disk And Memory Images For Free

A Practical Guide to Using FTK Imager in Digital Forensics

Digital forensics plays a crucial role in modern cybersecurity investigations. Among the many tools used by professionals in the field, FTK Imager is one of the most trusted for acquiring and preserving digital evidence. Whether you’re an investigator, analyst, or student, understanding how to use FTK Imager effectively can significantly improve the accuracy and reliability of your forensic work.

This guide covers the tool’s key features, practical use cases, and tips for maintaining evidence integrity throughout the investigative process.

What is FTK Imager 

FTK Imager is a free online tool for taking disk and memory images. You can download it from the Exterro website in exchange for some basic contact details. We’re using the Windows version to walk you through how to use it, but it’s available for any platform. 

FTK Imager can perform a variety of imaging functions. It takes everything from physical disk images, where you’re capturing a bit-by-bit copy, to a logical image that shows user files and folders. It can also image physical disks such as DVDs or CDs. 

It’s a great tool for memory analysis. FTK Imager works through write blockers, and previously captured images can be mounted to it for analysis. 

Understanding FTK Imager

FTK Imager, developed by Exterro, is a widely-used tool that enables users to create exact images of storage devices and memory. It’s available at no cost, though you’ll need to submit some contact information to download it. Once installed, FTK Imager offers several core capabilities:

  • Physical disk imaging: Creates bit-level copies of entire drives.

  • Logical imaging: Captures selected files and directories.

  • Image file analysis: Allows the user to open and explore existing forensic image files.

  • Optical media imaging: Supports CDs, DVDs, and Blu-ray discs.

  • Memory capture: Extracts volatile memory for in-depth threat analysis.

What sets FTK Imager apart is its balance of simplicity and functionality—it’s lightweight, easy to use, and compatible with write blockers to maintain data authenticity.

Why FTK Imager Matters in Investigations

The integrity of digital evidence is paramount in legal and organizational investigations. FTK Imager supports this requirement through features that promote transparency and reliability. Some benefits include:

  • Cost-effective access: It’s free to use, making it accessible for both professionals and students.

  • Comprehensive imaging options: Covers both physical and logical acquisitions.

  • Preservation of original data: Ensures no modifications are made during acquisition.

  • Support for memory analysis: Helps uncover live or volatile data that might disappear after shutdown.

  • Compatibility with forensic hardware: Works well with write blockers, ensuring no accidental writes occur.

Imaging vs. Cloning: Know the Difference

In forensic work, it’s important to distinguish between imaging and cloning:

  • Disk imaging involves creating a single archive file that contains a bit-for-bit copy of a device. It’s ideal for investigations, as it allows analysis without altering the original.

  • Disk cloning, by contrast, creates an exact duplicate of a device onto another storage unit—useful in hardware upgrades but not always ideal for evidence preservation.

The Importance of Chain of Custody

Maintaining a clear and verifiable chain of custody is essential in digital forensics. Each action taken on evidence—from acquisition to analysis—should be documented. This:

  • Preserves the credibility of the data.

  • Meets legal and ethical standards.

  • Reduces the chance of misinterpretation.

  • Supports transparency and traceability throughout the case.

How to Use FTK Imager to Take Disk and Memory Images for Free

You will need administrator access to download and run FTK Imager. 

Using FTK Imager for Disk Capture

There are several options available for image capture: 

  • Physical: A bit-by-bit capture of a storage device 
  • Logical: An image of accessible files and folders
  • Image file: Primarily used to deconstruct a file 
  • Folder Contents: Logical file-level analysis 
  • Fernico Device: Used to get images from CDs/DVDs/Bluray 


When doing a logical image capture, it’s important to remember that you’ll be limited by the user’s permissions. You’ll only be able to see what the user has access to, and an administrator-level user is likely to have vastly different access than a system-level user. 

Step 1: Select the volume you want to image 

Note: If going through a write blocker, you need first to select how the write blocker is mounted.

Select the Drive you want to capture. You’ll notice FTK Imager includes metadata about the drive.

FTK images


In our example, we’ve selected a physical disk that is a primary or secondary disk VMWare for a virtual disk.  


Step 2: Select the file format and compression


Then you’ll see a “Create Image” box. With FTK Imager, you can create multiple images at the same time in different file formats in addition to just the raw image. These include E01, a format used with a number of other forensic tools, SMART, and even APF. Remember to consider that some file formats are proprietary and may be necessary to work with other tools that will be used. 


Next, you’ll select the destination for the image file. Note that you cannot image a drive onto itself, so you will need to use an external drive such as a USB or some other separate storage method. If you plan to use a separate section of a network drive, remember that it’s going to take up some bandwidth. 


Also, be mindful that these can be very large files, so setting the compression is important. The volumes can easily become very large, particularly with logical images over multiple drives. 

Another nice feature is that if you’ve selected E01 as your format, there is a place to put metadata such as a case number, evidence number, the examiner, and any additional notes. 


When creating a disk image, consider whether or not you’ll need to compress it, and which file format might be best for any other tools that you’re using. Then, click Finish, and it’ll start writing the image and drop the file. Assign a name, save the pagefile if you want, and you’re done. 


Using FTK Imager for Memory Capture 

Creating a memory image is even more simple than disk capture, as there aren’t as many options in the FTK Imager program.


Step 1:
Select Capture Memory from the file menu

Set the destination path and file name, include the pagefile if you’d like, and, if necessary, check the box that allows you to create an AD1 file (AD1 is a proprietary evidence file format that may be useful depending on which tools you’re using).  

Step 2: Click the Capture Memory button

And that’s it, you’re done! The file that comes out will be usable by most major analysis tools, including Volatility. 


Ensuring Image Authenticity

Verifying the integrity of forensic images is non-negotiable. FTK Imager supports hash generation, which allows you to:

  • Generate MD5 or SHA-256 hash values at acquisition.

  • Recalculate and compare hash values to confirm nothing has changed.

  • Keep clear records for validation during later stages of analysis.


Evidence Handling Best Practices

To ensure digital evidence is handled properly:

  • Always document acquisition times, dates, and individuals involved.

  • Maintain a complete chain of custody log.

  • Use trusted tools and hardware like write blockers.

  • Run regular hash verifications during the case.

  • Work in a controlled environment to prevent data corruption or loss.


What Comes Next?

After creating a forensic image:

  1. Choose an analysis tool like Autopsy, EnCase, or X-Ways.

  2. Continue documenting your activities and findings.

  3. Adhere to applicable legal and ethical standards.

  4. Review the data methodically to ensure accuracy and objectivity.

Final Thoughts

FTK Imager remains a cornerstone in digital forensics for good reason. It provides a reliable way to collect, preserve, and verify digital evidence—without needing expensive software licenses. By learning to use it properly and following sound forensic principles, investigators can ensure their work stands up to scrutiny both technically and legally.

 

See how Insane Cyber transforms security

Our products are designed to work with
you and keep your network protected.