DEV Community

sumeshi_kun
sumeshi_kun

Posted on

Disk Preservation Using the Forensic Linux "C.A.IN.E."

Overview

As the name suggests, C.A.IN.E. (Computer Aided Investigative Environment) is an investigative support environment for PCs. While there are several Linux distributions designed for forensics, C.A.IN.E. stands out because it's specifically engineered for that purpose, making it intuitive to use with well-organized documentation. I personally recommend it.

In this article, I will cover how to preserve disk images of devices under forensic investigation using C.A.IN.E.

https://www.caine-live.net/

I have also experimented with the Tsurugi and Paladin versions.

C.A.IN.E. is an Ubuntu-based OS.

Launch

In this article, I will focus on C.A.IN.E. 13.0 "WARP". After downloading, make sure to check the hash value:

certutil -hashfile caine13.0.iso sha256
SHA256 hash of caine13.0.iso:
6d25180757d6a8a71e98706009d7a9ba3613131727fc96c2037d78bbd4c8ce3a
CertUtil: -hashfile command completed successfully.
Enter fullscreen mode Exit fullscreen mode

In practice, you'd likely boot from USB on the target device, but for explanatory purposes, I will use VMware this time.
Image description

Preservation Procedure

The official website provides instructions on how to preserve image files. Please refer to it as well:
Imaging with CAINE

In this procedure, I am using msuhanov/ntfs-samples/ntfs.raw as the disk image to be preserved. It's small at 64GB (compressed to 80MB), making it convenient for testing.

Preparation

First, adjust the time zone to match your local region. Also, make sure to record the actions taken and their timestamps during preservation. For detailed guidelines, refer to trusted organizations.

Mounting the Disk

Click on the Mounter (the green HDD icon at the bottom right of the screen) to mount the target for preservation. Using this Mounter ensures the disk is mounted in ReadOnly mode for safety.

Here, the target for preservation is Test_volume.
Image description

Next, set up the destination for the image. Prepare a disk larger than the preservation image (128GB), partition it, and then right-click the Mounter icon to switch to Writable mount mode.
Image description

Be cautious, as disks mounted from this point will be in Writable mode. As before, select the disk and click OK to confirm it's mounted as Writable.
Image description

Preservation

Use Guymager to perform the image preservation. Right-click on /dev/sdb, the target disk, and select Acquire Image.
Image description

While there are various settings available, I will proceed with mostly the defaults. The image will be saved in E01 format, split into 2GB segments.
Image description

Click Start to begin the disk preservation. The progress will be displayed.
Image description

Confirmation

Once the preservation is complete, you can verify that the .E01 files and a .info file are saved on the specified disk.
Image description

The .info file contains details like the version of Guymager used, detailed information, and the hash value of the preserved image.

Conclusion

By using C.A.IN.E., I was able to easily preserve the disk through a GUI. It includes essential features like default ReadOnly mode, showing that it's developed with real forensic use in mind.

Personally, I find it quite user-friendly, so having a Live boot USB ready and handy might be a good idea.

This article was translated by ChatGPT o1-preview.
Original Post(Japanese): https://zenn.dev/sum3sh1/articles/a497f834ce1bbc

Top comments (0)