{"id":16745,"date":"2024-06-18T17:29:40","date_gmt":"2024-06-18T15:29:40","guid":{"rendered":"https:\/\/immune.institute\/?p=16745"},"modified":"2025-10-07T11:32:40","modified_gmt":"2025-10-07T09:32:40","slug":"recuperacion-de-archivos-5-pasos-a-seguir","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/recuperacion-de-archivos-5-pasos-a-seguir\/","title":{"rendered":"File recovery for noobs: FTK Imager"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Data loss is an event that happens at any time and for a variety of reasons. For this reason, the <strong>file recovery <\/strong>can be an arduous and time-consuming process, involving the identification, retrieval and preservation of data that cannot be seen with the naked eye. The tools of <strong><a href=\"https:\/\/immune.institute\/en\/blog\/analista-forense-informatico\/\">forensic analysis<\/a><\/strong> are a great help in these circumstances, as they are specially designed to find and rescue such files.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>When is file recovery necessary?<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">File recovery is a necessary process in a variety of situations, which can become critical in both professional and personal environments. One of the most common environments for this activity is in the <strong>forensic analysis<\/strong>The project is immersed in legal and criminal investigations, but lessons can be learned from these professionals to adapt some of their processes to more frequent day-to-day contexts, such as the loss of files.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Files can be lost for a multitude of reasons, ranging from errors such as the <strong>accidental disposal<\/strong> to situations of <strong>cyber attacks<\/strong>. If no backups are available and data or files are lost, the only option left to restore the deleted items is to use a recovery tool. Knowing how to perform this step independently can transform a catastrophic situation into a mere temporary interruption.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>FTK Imager as a recovery programme<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">File recovery can be done with a multitude of tools, especially those specific to forensic analysis. <a href=\"https:\/\/www.exterro.com\/digital-forensics-software\/ftk-imager\" target=\"_blank\" rel=\"noopener\">FTK Imager<\/a> is one of the most popular options among professionals, as it is compatible with a multitude of systems and file types. It allows you to make a disk image, i.e. an exact copy of the storage disk with all data present, visible and deleted. This is especially useful when the deletion has been recent and the deleted data has not been overwritten. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Each tool has its own advantages and disadvantages depending on the tasks required, such as imaging RAM or working on a state-of-the-art smartphone. In the case of the FTK Imager, its<strong> compatibility and simplicity<\/strong> make it accessible to inexperienced users.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Steps to follow to perform data recovery<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Recovery with FTK Imager requires only a few simple steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.exterro.com\/digital-forensics-software\/ftk-imager\" target=\"_blank\" rel=\"noopener\">Download the programme from the official website<\/a> and install it.<\/li>\n\n\n\n<li>Select the disk or device on which the files to be recovered are located.<\/li>\n\n\n\n<li>Create a disk image in order to be able to work with an exact copy and not run the risk of losing or overwriting more data.<\/li>\n\n\n\n<li>Scan the disk image to locate the deleted files to be recovered.<\/li>\n\n\n\n<li>Save the files in a secure location.<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">After this process has been completed, there are some preventative steps to take to avoid it happening again, such as backing up to the cloud or implementing stricter cybersecurity measures. Using two-factor authentication, being more vigilant to possible fraud attempts via digital messaging or downloading files only from trusted websites are some of the measures we can take to avoid losing our data again.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"791\" height=\"320\" data-id=\"16747\" src=\"https:\/\/principal.immune.institute\/wp-content\/uploads\/2024\/06\/recuperacion-de-archivos-FTK-Imager.jpeg\" alt=\"\" class=\"wp-image-16747\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2024\/06\/recuperacion-de-archivos-FTK-Imager.jpeg 791w, https:\/\/immune.institute\/wp-content\/uploads\/2024\/06\/recuperacion-de-archivos-FTK-Imager-256x104.jpeg 256w, https:\/\/immune.institute\/wp-content\/uploads\/2024\/06\/recuperacion-de-archivos-FTK-Imager-512x207.jpeg 512w, https:\/\/immune.institute\/wp-content\/uploads\/2024\/06\/recuperacion-de-archivos-FTK-Imager-768x311.jpeg 768w, https:\/\/immune.institute\/wp-content\/uploads\/2024\/06\/recuperacion-de-archivos-FTK-Imager-18x7.jpeg 18w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><\/figure>\n<\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Recovering files does not have to be a complicated task, especially if it is done soon after they are lost. Forensic analysis tools such as <strong>FTK Imager<\/strong>The new, all-environment recovery-ready products give novices a helping hand and make their jobs easier, showing that the cyber security industry can be useful for more than just preventing cyber-attacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This content is part of IMMUNE's Master's Degree in Cybersecurity, and has been developed by its academic department. <\/p>","protected":false},"excerpt":{"rendered":"<p>La p\u00e9rdida de datos es un suceso que sucede en cualquier momento y por motivos variados. Por eso, la recuperaci\u00f3n de archivos puede ser un proceso arduo y alargado en el tiempo, al implicar la identificaci\u00f3n, recuperaci\u00f3n y preservaci\u00f3n de datos que no se pueden ver a simple vista. Las herramientas de an\u00e1lisis forense son [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":12354,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-16745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/16745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=16745"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/16745\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/12354"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=16745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=16745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=16745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}