No.
Not out of the box.
The uploading code is based on boto,
and you could create a new class in
uploader.py
and implement the private methods to the needs of other Cloud storage services.
Some flags should probably be added to the
auto_acquire
main script, and (if you use the image building scripts from the tools
directory) add those to make_bootable_usb_image
function of
remaster.sh
when the 'double-clickable' helper script is created (search for EOFORENSICSH
)
Probably not.
The script lists block devices that have been detected by the kernel running on the system (ie: a vanilla Ubuntu).
If the block device doesn't show up when running lsblk
in the booted OS, it's
not going to be detected.
If your target system can boot over USB (with EFI) and its devices are recognized as block devices in a vanilla Xubuntu, then those will be acquired.
Some hardware is still not recognized in the Linux kernel and makes acquisition a bit more complicated:
- Wifi module used in MacBook post 2016 is still unsupported see bug. You will need to use a USB->RJ45 adapter.
This has only been tested on Xubuntu Xenial Xerus (16.04) and Bionic Beaver (18.04).
Then the script will most likely fail. Depending on the failure detected, a message will be displayed to the user saying they probably should retry by running the script again.
It performs 'resumable' upload which does handle some errors and will try to re-send chunks in the vent of some network errors. If internet connectivity is lost for a significant amount of time, the upload will stop and you won't be able to resume from the last known uploaded chunk.
Not really.
None of the code used in this project has been certified, and does not follow and ISO standard.
No write blocking mechanism is currently implemented.
To try and keep some trust about the data being copied from disk, the code also
uploads MD5 and SHA1 hashes for every 128MiB read from the device, as well as
the whole content. This is uploaded alongside the sdX.image
file, as
sdX.hash
.
dd
clones generate raw images, which can be readily processed by most other
forensics tools.
dcfldd
was chosen as it's readily available in Ubuntu archives and will
calculate MD5/SHA hashes as it's reading from the block device, even though it
may misbehave when reading faulty drives.
Adding a new recipe, where one can use another tool to read blocks off the device is explained here
Yes.
Call the auto_acquire.py
script with the --select_disk
flag.
These scripts come as helpers to get you started quickly (by setting up GCS and remastering an vanilla Xubuntu ISO with the acquisition scripts).
The acquisition scripts don't use them.
If this is a risk you're not willing to take, make sure you acquire only encrypted devices, e.g.: laptops with Full Disk Encryption such as FileVault or BitLocker.
Alternatively, you can also create your own uploader class to upload data to a destination of your chosing. (see Does the code support other Cloud hosting services?)
You can disable acquiring the firmware of the target system by only enabling the Disk recipe (see the tool's help).