CAINE 11 – GNU/Linux Live Distribution

CAINE or Computer Aided INvestigative Environment is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari – Italy).

It offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface.

The main design objectives that CAINE aims to guarantee are the following:

  • An interoperable environment that supports the digital investigator during the four phases of the digital investigation
  • A user-friendly graphical interface
  • User-friendly tools

CAINE represents fully the spirit of the Open Source philosophy because the project is completely open, everyone could take on the legacy of the previous developer or project manager.

The distro is open source, the Windows side is freeware and, the last but not least, the distro is installable, thus giving the opportunity to rebuild it in a new brand version.

The important news is CAINE 11.0 blocks all the block devices (e.g. /dev/sda), in Read-Only mode. You can use a tool with a GUI named BlockON/OFF present on CAINE’s Desktop.

This new write-blocking method assures all disks are really preserved from accidentally writing operations, because they are locked in Read-Only mode.

  • If you need to write a disk, you can unlock it with BlockOn/Off or using “Mounter” changing the policy in writable mode.
  • CAINE is always more fast during the boot.
  • CAINE 11.0 can boot to RAM (toram).

Also Read – AntiDisposmail : Detecting Disposable Email Addresses

Important Feature Changes

  • All devices are blocked in Read-Only mode, by default.
  • New tools, new OSINT, Autopsy 4.13 onboard, APFS ready,BTRFS forensic tool, NVME SSD drivers ready!
  • SSH server disabled by default (see Manual page for enabling it).
  • SCRCPY – screen your android device
  • Autopsy 4.13 + additional plugins by McKinnon.
  • X11VNC Server – to control CAINE remotely.
  • Hashcat
  • NEW SCRIPTS (Forensics Tools – Analysis menu)
  • AutoMacTc – a forensics tool for Mac.
  • Bitlocker – volatility plugin
  • Autotimeliner – Automatically extract forensic timeline from volatile memory dumps.
  • Firmwalker – firmware analyzer.
  • CDQR – Cold Disk Quick Response tool
  • Many others fixing and software updating.
R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago