If you wish to participate by providing the translation of the report in your language or if you have found a translation mistake, please contact the CAINE team. I also suggest to take a look to our forum here , if you want to contribute or find some important informations and many guides provided directly by the users of CAINE. This site is licensed under a Creative Commons License. News 35 Release Caine 9. Autopsy 2. Caine 8. CAINE 8. Caine 7.
CAINE 7. Caine 6. CAINE 6. CAINE 5. Caine LittleStar 64bit released! Caine 4. NBCaine 3. Caine 3. CAINE 2. CAINE 1. Stay Tuned! The Quick View tool automates this process by determining the file type and rendering it with the appropriate tool. The live preview Caja scripts also provide easy access to administrative functions, such as making an attached device writeable, dropping to the shell, or opening a Caja window with administrator privileges.
The "Save as Evidence" script will write the selected file s to an "Evidence" folder on the desktop and create a text report about the file containing file metadata and an investigator comment, if desired. A unique script, "Identify iPod Owner", is included in the toolset. This script will detect an attached and mounted iPod Device, display metadata about the device current username, device serial number, etc. The investigator has the option to search allocated media files and unallocated space for iTunes user information present in media purchased through the Apple iTunes store, i.
The live preview scripts are a work in progress. Many more scripts are possible as are improvements to the existing scripts. The preview scripts were born from a desire to make evidence extraction simple for any investigator with basic computer skills. They allow the investigator to get basic evidence to support the investigation without the need of advanced computer forensics training or waiting upon a computer forensics lab.
I have just tried uNetbootin using Windows and it works perfectly. A brilliant little program IMHO. Thanks for Necroing this topic. I have a live forensics disk I've wanted to put on a HDD for a while, and the poor man's install method sucks. Going to try this out. There is a raw. I was wondering if it was possible and, if so, how to use more than one ISO on a single USB, so I can select the tool into which I wish to boot from the initial menu. Forum Icons: Forum contains no unread posts Forum contains unread posts.
Main Category. Forensic Software. These are broadly divided into three sections. The first has tools to help you gather information about the environment, assess vulnerabilities of web tools, and more.
The second has tools to help you reverse-engineer programs and social-engineer people. The third has tools for all kinds of analysis. As an added bonus, the distro also ships with Tor and a script that will route all Internet bound traffic from the distro via the Tor network. As its name suggests, BlackArch is based on Arch Linux. The distro sorts the tools by classifying them under categories, such as anti-forensic, backdoor and cracker. These are however arranged alphabetically and offer no further sub-categories, which poses interesting navigation issues.
For instance, some categories, such as cracker, recon and automation list over a hundred tools each, which makes scrolling through the menus rather cumbersome. If you are already an Arch user, you can install BlackArch atop your existing installation by pulling in packages via groups such as blackarch-cracker, blackarch-exploitation, blackarch-forensic, and dozens more.
On the flip side, the distro relies on a bunch of light-weight but esoteric window managers to draw the desktop. By default, the distro uses fluxbox but also offers i3, openbox, fluxbox, and others. This further restricts the audience for the distro. Perhaps the most well-known pentesting distro, Kali Linux is based on Debian and uses the Xfce desktop.
0コメント