Exploring Guymager

On most forensic projects, you will work from an image, so first let's get an image to work with. Guymager is a forensic imager for media acquisition. It has a nice GUI and saves images out in several formats used in forensic imaging. The application will also make a clone of a drive. You can find Guymager in the Usual applications | System Tools menu:

Exploring Guymager

Guymager has two modes of saving files:

  1. The acquire mode, where you might want an image for digital evidence.
  2. The clone mode, in case you need the entire partition duplicated.

The difference is, in acquire mode the image is digitally signed with a checksum and other information to prove no tampering of the evidence has been done to the image. In a legal case, you would pull two images. You would acquire one and digitally sign it for evidence and clone another to investigate. Since you really never know whether your case could become part of a legal proceeding, you might want to always pull two copies of the partitions you are cloning. It could be a disaster if you don't.

In order to pull these images, you will need two drives of the same size or larger than your evidence to save these out to. One will be your evidence drive and one will be your working copy. Following, you will notice we have a /dev/sdb connected. This will be our USB drive that we will save our cloned images to.

There are several ways you might get the content of a disk for testing:

Since this task involves preserving the content of the hard drive partition as it is, you do not want to start Kali in the usual Live-Disk way. The Live-Disk mode writes to the host hard drive from time to time. If you are presented with a system unit (host machine) that has either got files that were deleted accidentally or on purpose, the files may be left entirely or partially intact on the drive. You certainly would not want to install Kali, which would partially or completely overwrite the drive under test. For this set of tasks, Kali has a Live Forensic mode that uses the RAM on the test machine, but does not write to the hard disk. It is important not to write anything to the hard drive, whether it is going to become evidence in a court case or not. You cannot recover file fragments you have written over them with other files:

Starting Kali for Forensics

For this demo, we will be working from a Vmware image of a machine. The method will be the same if you are working with a normal physical drive. If you are working with a hard drive, connect the hard drive to the Kali imaging machine and click the Rescan button. This will rescan all drives and your newly connected drive will appear in the interface. For a Vmware image, pick Add special device. This will give you a file menu so you can pick the image file. You would use this command also for other image types, like backing up images of images made with dd copy that are on your already-attached drive:

Acquiring a drive to be legal evidence

Following, you will see we have attached a Vmware hard drive image. We also have showing /dev/sda, which is our operating system's drive, and /dev/sdb, which is the USB drive to which we are writing our images:

Acquiring a drive to be legal evidence

First, let's acquire an image for evidence:

In the following screenshot, Guymager is running:

Acquiring a drive to be legal evidence

Once Guymager has finished its run, you will see the following screen. The bottom section will give you the information on the image and the run time:

Acquiring a drive to be legal evidence

If you are just using Guymager to clone the partition, the task is much easier. This is a second Kali setup, so the drive names are different. Right-click on the partition you want to clone, as shown in the following:

Cloning With Guymager

You will then get the following window:

The following screenshot is the very helpful dialog that shows the drives attached to the Kali box. The only drive big enough to take the entire content of the device being cloned is the second drive, with 107.4GB total. The sizes here are the full size of the device. If you already had something taking up half of the 107.4GB, your cloning would either fail or overwrite the existing data:

Cloning With Guymager

When the cloning procedure is complete, you can mount the receiver partition and your cloned partition will be available under the name you gave it. Following is part of the info file for this cloning, showing the SHA-256 hash and verification. The Cloning and Verification process took about 19 minutes:

Cloning With Guymager