Creating hard disk images with Guymager
Mirror, Mirror…
If malware has taken root on a system, you need a way to safeguard the evidence. Guymager helps you create verified disk images.
Forensic data backup tools are used in situations in which analysis of the original medium is not advisable because it could cause structural changes. The best way to study a storage medium for evidence of malware or intrusion activity is to make an accurate copy and perform your analysis on the copy. However, you need a way to verify that the duplicate is an accurate copy of the original.
Conventional disk image copy tools usually are not suitable for this type of undertaking because they lack an option for validating the image. On the other end, a high-end, professional forensics distro is sometimes more than you need. In these cases, Guymager [1] disk image tool is an interesting option. Guymager quickly creates images and, at the same time, provides evidence of identical data structures.
Getting Guymager
Guymager is available from the repositories on Debian and Ubuntu and their derivatives. For openSUSE [2] and Fedora [3], you can pick up the packages online. Additionally, a few Live distros like Deft or Kali Linux also contain the tool. For all other systems, your only option is to build from the source code, which you will find on the project web page along with detailed instructions.
Image
After you click on the launcher, Guymager prompts you for a password to assume administrative privileges. Then, a new window appears (Figure 1).
The program immediately begins to scan the system for mass storage. It takes into account internal and external drivers, although optical drives only appear in the list if a disc is inserted. The fact that the software displays the individual drives with the names of the device files and the model names makes the choice easier.
To create an image, first click on the desired source medium in the list. Then, in the context menu, select the option Create image file. This opens a very detailed settings window (Figure 2).
In the File format section, specify the format you want to use when creating the image. The application uses EWF as the default; this is the typical format for professional forensic applications. As an alternative, Guymager offers to use the dd
tool to create a matching image.
If you keep the EWF format, you can enter additional information, such as the evidence number, case number, reviewer, and a description. If you use dd
, the software disables these fields, because the syntax of the command-line tool does not support these metadata.
Depending on the size of the source data and the target disk, you might want to split the image into individual parts. In this case, enter a size in the Split size box top right in the window. If you choose EMF format, the software automatically configures a value at this point. If you are backing up with dd
, you have the option of unchecking Split image files and creating an image in one fell swoop.
In the Destination section at the center of the window, specify a label for the automatically generated Info file, along with the path for storing the image, and the image name. This info file contains precise textual documentation of the work steps necessary to create the image.
Please note, that certain characters such as hyphens and underscores are not allowed in the name of the info file. Guymager displays a warning in such cases but also independently changes the file name. The file with the information typically uses the same name as the image; the software automatically adds a suffix of .info
to prevent possible confusion.
Hash Can!
The integrity of the existing data and the image plays a prominent role in forensic work. The software thus works with hash functions to document this. Guymager relies on the MD5 algorithm, as well as SHA algorithm variants SHA-1 and SHA-256 (as a part of SHA-2) to calculate checksums.
By default, the software works with MD5, but you can enable the two other features by checking the corresponding options in the Hash calculation/verification section. This step is advisable because the MD5 algorithm is no longer considered state of the art.
Below this, you can click a checkbox to decide whether the program should verify the source and image on completion. By default, Guymager only checks the image after creating it. Keep in mind that verifying large disk drives and large images can be very time-consuming.
After you have configured all the required settings, click on the Start button bottom right in the window. The software now creates the image. In the main window, in the State column of the row of the corresponding data carrier, you will see a blue dot telling you Acquisition running. In the Progress column, a blue horizontal bar also informs you of the progress of the action.
Additionally, all the important settings for creating the image appear at the bottom of the program window. You can read the current data rate for saving the data in megabytes per second. After completing the image, the application shows you matching information under the State heading.
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Gnome 47.1 Released with a Few Fixes
The latest release of the Gnome desktop is all about fixing a few nagging issues and not about bringing new features into the mix.
-
System76 Unveils an Ampere-Powered Thelio Desktop
If you're looking for a new desktop system for developing autonomous driving and software-defined vehicle solutions. System76 has you covered.
-
VirtualBox 7.1.4 Includes Initial Support for Linux kernel 6.12
The latest version of VirtualBox has arrived and it not only adds initial support for kernel 6.12 but another feature that will make using the virtual machine tool much easier.
-
New Slimbook EVO with Raw AMD Ryzen Power
If you're looking for serious power in a 14" ultrabook that is powered by Linux, Slimbook has just the thing for you.
-
The Gnome Foundation Struggling to Stay Afloat
The foundation behind the Gnome desktop environment is having to go through some serious belt-tightening due to continued financial problems.
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.