Supported Image File Formats

Blade supports a number of forensic image and output file formats.  The following table presents a summary of the supported file types.


Supported Forensic Image Formats
EnCase®  v1 - 8 Image File (EVF / Expert Witness Format)
EnCase® v7 - 8 Image File (ex01)*.ex01
AccessData®  FTK Image Files
*.e01, *.001, *.s01

Advanced Forensic Format (AFF®)

Logicube Forensic Dossier® E01*.e01
SMART/Expert Witness Image File
X-Ways Forensics Image File
VMWare Virtual Disk File
Virtual Hard Disk File
Segmented Image Unix / Linux DD / Raw Image Files
*.000, *.001
Single Image  Unix / Linux DD/Raw Image Files
*.dd; *.img; *.ima; *.raw
Memory Dumps
*.dmp; *.dump; *.crash; *.mem; *.vmem; *.mdmp
Binary Dumps
*.bin; *.dat; *.unallocated; *.rec; *.data; *.binary
Micro Systemation Extraction File

Table 1

Sector Level Access to Physical / Logical Devices

 Blade can search any binary file for supported recovery profiles and also supports direct sector level access to Physical and Logical devices.  This allows the user to employ hardware / software write blockers and to recover data directly from a disk or external media.