Supported Formats Overview
IPED uses the Sleuthkit Library for disk image decoding and file system parsing, providing broad format compatibility.Forensic Images
E01, Ex01, AFF, AD1, UFDR formats
Raw Images
DD, RAW, split segments
Virtual Disks
VMDK, VHD, VHDX (including differential disks)
Optical Media
ISO9660, UDF, ISO formats
Physical Devices
Direct access to physical drives
File Systems
NTFS, FAT, exFAT, ext2/3/4, HFS+, APFS
Local Folders
Process live file systems and network shares
IPED Cases
Reprocess tagged files from existing cases
Forensic Disk Images
EnCase Evidence Files (E01/Ex01)
Expert Witness Format by Guidance Software Supported variants:- E01 - Standard EnCase format
- Ex01 - Extended EnCase format
- Split segments - E01, E02, E03, etc.
- Compressed - Built-in compression supported
- Encrypted - Password-protected images
Terminal
IPED automatically detects and loads all segments when you specify the first file (.E01).
AccessData (AD1)
AccessData Forensic Toolkit image format Features:- Single file or segmented
- Compressed and encrypted variants
- Preserves metadata and hash information
Terminal
Cellebrite (UFDR)
Cellebrite Universal Forensic Data Reader format Common sources:- Mobile device extractions
- Cellebrite Physical Analyzer exports
- UFED extractions
Terminal
Advanced Forensic Format (AFF)
Open-source forensic disk image format Platforms:- Full support on Linux
- Limited support on Windows
- Compression
- Encryption
- Metadata storage
- Chain of custody
Terminal Linux
Raw Disk Images
DD / RAW Format
Bit-for-bit copy of storage media Variants:- Single file - Complete image in one file
- Split segments - disk.001, disk.002, etc.
- DD - Unix/Linux dd utility output
- RAW - Generic raw format
Terminal
Split Segment Naming
IPED recognizes these naming patterns:disk.001,disk.002,disk.003, …disk.aa,disk.ab,disk.ac, …disk.000,disk.001,disk.002, …
Virtual Disk Formats
VMware (VMDK)
VMware Virtual Machine Disk Supported types:- Monolithic sparse
- Monolithic flat
- Split sparse (2GB segments)
- Split flat
- Differential disks (snapshots with parent chain)
Terminal
IPED supports differential VMDKs and automatically resolves parent disk chains.
VirtualBox / Hyper-V (VHD/VHDX)
Microsoft Virtual Hard Disk formats VHD Features:- Fixed size
- Dynamic (sparse)
- Differencing disks
- Larger disk support (64TB)
- Improved performance
- Better corruption resistance
Terminal
Optical Media
ISO / ISO9660
Optical disc image format Supported:- ISO9660 (CD-ROM)
- UDF (DVD/Blu-ray)
- Hybrid ISO9660/UDF
- Joliet extensions
- Rock Ridge extensions
Terminal
- CD/DVD images
- Software distributions
- Backup archives
- Bootable media
Physical Devices
Direct Device Access
Process physical drives directly Linux:Terminal
Terminal
Windows Physical Drive Notation
Windows uses special notation for physical devices:| Device | Notation |
|---|---|
| First physical drive | \\.\PhysicalDrive0 |
| Second physical drive | \\.\PhysicalDrive1 |
| Drive letter E: | \\.\E: |
| Volume GUID | \\?\Volume{guid} |
File Systems
Supported File Systems
IPED supports all file systems recognized by Sleuthkit:- Windows
- Linux
- macOS
- Other
- NTFS - Full support with all features
- FAT12/16/32 - Including deleted file recovery
- exFAT - Modern large-volume FAT
- Alternate Data Streams (ADS)
- File system journal parsing
- Deleted file recovery
- Slack space analysis
Timezone Handling
FAT file systems don’t store timezone information. Specify the original timezone:Terminal
NTFS and ext file systems store UTC timestamps and don’t require timezone specification.
Local Folders
Processing Live File Systems
Process folders directly from mounted file systemsTerminal
- Corporate network shares
- Mounted disk images
- Cloud storage sync folders
- Live system analysis (with caution)
Owner Information
Include file owner information (slow over network):Terminal
Embedded Disk Images
Nested Disk Images
IPED automatically detects and processes disk images found within evidence Supported scenarios:- E01 files inside another disk image
- VMDK inside a file system
- VHD in email attachments
- ISO files on a drive
Terminal
IPEDConfig.txt
IPED can process multiple layers of nested disk images automatically.
IPED Case Files
Reprocessing Tagged Data
Process files from existing IPED cases Use case: Export tagged/bookmarked files and reprocess with different settingsTerminal
Multiple Data Sources
Processing Multiple Sources
Combine multiple evidence sources into one caseTerminal
- Unified search across all devices
- Cross-device timeline analysis
- Combined communication graphs
- Single case for reporting
Adding to Existing Cases
Append new evidence to processed cases:Terminal
Encrypted Evidence
Password-Protected Images
Process encrypted disk imagesTerminal
- EnCase password protection
- BitLocker encrypted volumes (with recovery key)
- VeraCrypt containers (with password)
Sector Size Configuration
4K Sector Drives
Modern drives with 4096-byte sectorsTerminal
- Modern large-capacity drives (4TB+)
- Advanced Format drives
- Some SSDs
Most drives still use 512-byte sectors. Only specify
-b 4096 if you’re certain the drive uses 4K sectors.Portable Cases
Relative Path References
Create portable cases that can move between systemsTerminal
- Evidence and case must be on same volume
- Use relative paths when specifying evidence
- Move evidence and case together
- Cases on external drives
- Sharing cases between investigators
- Court presentation systems
Data Source Examples
Complete Forensic Workstation
Terminal
Virtual Machine Investigation
Terminal
Corporate Network Share
Terminal
Troubleshooting Data Sources
Cannot open disk image
Cannot open disk image
Symptoms: “File not found” or “Cannot read image”Solutions:
- Verify file exists and path is correct
- Check file permissions (read access required)
- For split segments, ensure all parts are present
- For physical drives, ensure administrator/root privileges
Encrypted image won't open
Encrypted image won't open
Symptoms: “Password incorrect” or “Cannot decrypt”Solutions:
- Verify password is correct (case-sensitive)
- Ensure quotes around password if it contains spaces
- Check encryption method is supported
- For BitLocker, use recovery key not password
File system not detected
File system not detected
Symptoms: “No file system found” or “Unknown file system”Solutions:
- Verify image isn’t corrupted
- Check if file system is supported by Sleuthkit
- Try specifying sector size with
-boption - For damaged file systems, use specialized recovery tools first
Slow processing over network
Slow processing over network
Symptoms: Very slow processing speedSolutions:
- Copy evidence to local storage first
- Use gigabit or faster network
- Disable
--addowneroption for network shares - Consider using VPN or direct connection
Split segments not found
Split segments not found
Symptoms: “Cannot find segment X”Solutions:
- Ensure all segments are in same directory
- Verify segment numbering is sequential
- Check for naming inconsistencies
- Ensure no segments are missing
Best Practices
Use write blockers
When processing physical devices, always use hardware or software write blockers.
Process locally when possible
Copy evidence to local fast storage (SSD) for optimal processing speed.
Performance by Data Source
| Format | Relative Speed | Notes |
|---|---|---|
| DD/RAW | Fast (baseline) | Best performance |
| E01 | Medium | Decompression overhead |
| Ex01 | Medium | Similar to E01 |
| VMDK | Fast | Direct access |
| VHD/VHDX | Fast | Efficient format |
| Physical Device | Fast | Direct I/O |
| Network Share | Slow | Network latency |
| ISO | Fast | Simple format |
| AD1 | Medium | Depends on compression |
| UFDR | Medium | Mobile extraction format |
Next Steps
Command-Line Options
Learn parameters for processing different data sources
Processing Profiles
Choose optimal profiles for different evidence types
Configuration
Configure file system and parsing options
Troubleshooting
Solve data source processing issues