Linux forensic tools

There is also a wide range of Linux distributions that have been created for digital forensics purposes. These distributions, often provided for free, provide tools that can aid a digital forensics investigator. These tools are divided into two main types. The first of these is distributions that are intended as boot CD/DVD or USBs. These are useful for conducting triage or to obtain access to files, without having to image the drive. These distributions can be placed onto a CD/DVD or, more commonly now, a USB device. The examiner then boots the system under investigation into the Linux distribution. There are a number of these distributions available.

The following are two that are popular with digital forensics examiners:

Another category of Linux distributions is those designed as platforms for conducting an examination of evidence such as RAM captures and network evidence. There are several distributions available:

Once Ubuntu has been fully installed, run the following command:

wget --quiet -O - https://raw.github.com/sans-dfir/sift-
bootstrap/master/bootstrap.sh | sudo bash -s -- -i -s -y

Once installed, there is a desktop, based upon the Ubuntu distribution, with additional tools that are run from the command line or through a GUI, as can be seen in the following screenshot:

REMnux can be downloaded as a virtual machine from https://remnux.org for a standalone virtual system. REMnux can also be added to either the SIFT workstation or CAINE by utilizing the following command:

wget --quiet -O - https://remnux.org/get-remnux.sh | sudo bash

When incorporating different tools into a CSIRT digital forensics capability, it is important to keep several factors in mind. First, tools that have been developed by outsiders should absolutely be tested for efficacy. This can be done through the use of test data, commonly available on the internet. Second, open source tools such as Linux distributions are sometimes not adequately maintained. Digital forensics analysts should ensure that tools such as SIFT, CAINE, and REMnux are updated as new versions of both the tools and underlying operating systems become available. Finally, some tools that we will explore in this book are derived from network monitoring tools, but can also serve as tools in incident response. When using these tools, it is critical to document their use and their justification. If ever the efficacy and reliability of the evidence obtained or analyzed with these tools are called into question, proper documentation can lessen the chances of their use being seen as forensically unsound.

The National Institute of Standards and Technology (NIST) has provided guidance on the proper testing of forensic tools through the Computer Forensics Tool Testing (CFTT) program, found at http://www.cftt.nist.gov/. In addition to specific guidance on testing, there are a number of reports on different forensic hardware and software products. Having this information available for the tools you use provides validation, in the event that their use is ever challenged in a courtroom.