Supported Image File Formats
Blade supports a number of forensic image and output file formats. The following table presents a summary of the supported file types.
Supported Forensic Image Formats | |
EnCase® v1 - 8 Image File (EVF / Expert Witness Format) | *.e01 |
EnCase® v7 - 8 Image File (ex01) | *.ex01 |
AccessData® FTK Image Files | *.e01, *.001, *.s01 |
Advanced Forensic Format (AFF®) | *.aff;*.afd,*.afm |
Logicube Forensic Dossier® E01 | *.e01 |
SMART/Expert Witness Image File | *.s01 |
X-Ways Forensics Image File | *.e01 |
VMWare Virtual Disk File | *.vmdk |
Virtual Hard Disk File | *.vhd |
Segmented Image Unix / Linux DD / Raw Image Files | *.000, *.001 |
Single Image Unix / Linux DD/Raw Image Files | *.dd; *.img; *.ima; *.raw |
Memory Dumps | *.dmp; *.dump; *.crash; *.mem; *.vmem; *.mdmp |
Binary Dumps | *.bin; *.dat; *.unallocated; *.rec; *.data; *.binary |
Micro Systemation Extraction File | *.xry |
Table 1
Sector Level Access to Physical / Logical Devices
Blade can search any binary file for supported recovery profiles and also supports direct sector level access to Physical and Logical devices. This allows the user to employ hardware / software write blockers and to recover data directly from a disk or external media.