2
Most read
4
Most read
6
Most read
“Memory Forensics ”
Session By: Anshul Tayal
Outline
• Introduction
• What can be found in Memory
• Overview of the process
• Tools & Techniques
• Various Formats
• Memory Forensics in Context of Windows Device
• Memory Forensics in Context of Linux Device
• Hardware Approaches for Memory Forensics
• Little discussion on the deference between Windows and Linux Forensics
2
Introduction
Digital analysis can be broadly studied under two headings
a) Static or Dead analysis where, the target devices that are to be analyzed are
shut down and
b) Live analysis where, the system stays in the boot mode and is kept alive.
The live analysis has become a need with the increase of cyber crime because
individuals have started deleting the contents as soon as possible without
saving the contents on the hard drive. Hence in order to retrieve more valuable
information the forensic analyst needs to examine the volatile memory.
3
Introduction
What is Memory Forensics?
4
The science of examining the
volatile or live memory is referred
to as Memory Forensics.
What can be found in Memory?
What can be found in the Main Memory?
a) Running Processes.
b) Running Threads.
c) Password/Keys other related information.
d) Live registry hives (in case of windows only).
e) Malware presence
f) Malicious/ Suspicious activities
g) Open Connections to the network
In fact anything that processor works upon…
5
Overview of the process
Memory Forensics can be studied broadly under three categories:
a) Acquisition of memory
b) Analyzing the acquired data
c) Recovering the evidence
6
Acquisition Analyze Evidences
Tools & Techniques
Tools used for the acquisition of the Memory
a) For Windows Platform
• Belkasoft Live RAM Capturer
• FTK Imager
• OSForensics
• MadiantMemoryz
• DumpIt etc.
b) For Linux Platform
• LiME (Linux Memory Extractor)
• Second Look
• Fmem etc.
7
Tools & Techniques
Tools used for Analyzing the acquired data
a) For Windows Platform
• Belkasoft Evidence Center
• wxHexEditor
• Autopsy
• Volatility *
b) For Linux Platform
• Volatility *
• The Sleuth Kit (TSK) etc.
8
Various Formats
Tools used for the acquisition of the Memory
a) Raw Dump (.img/.dd)
b) Windows Crash dump format (.bin)
c) Memory dump (.mem)
d) Commercial Tools Formats
• Encase (.E01)
• VMware (.Vmem)
• FastDump Pro (hpak)
9
Demonstrations
10
11
Memory Forensics

More Related Content

PPTX
Memory forensics.pptx
PDF
Super Easy Memory Forensics
 
PPTX
Memory forensics
PPTX
Digital forensics
PDF
CS6004 Cyber Forensics
PPTX
Ethernet
PPTX
cyber security and forensic tools
PPTX
Autopsy Digital forensics tool
Memory forensics.pptx
Super Easy Memory Forensics
 
Memory forensics
Digital forensics
CS6004 Cyber Forensics
Ethernet
cyber security and forensic tools
Autopsy Digital forensics tool

What's hot (20)

PPTX
Network Forensics Intro
PDF
Cyber Forensics Module 1
PPTX
Mobile Forensics
PPTX
Computer forensics
PPTX
Digital Forensics best practices with the use of open source tools and admiss...
PPTX
Mobile Forensics
PDF
Anti forensics-techniques-for-browsing-artifacts
ODT
Operating System Forensics
PDF
Next Generation Memory Forensics
PPT
computer forensics
PPT
Windows forensic artifacts
PPTX
Network Forensics
PPTX
Open source network forensics and advanced pcap analysis
PPTX
Digital Forensics
PPTX
Computer forensic ppt
PPT
Linux forensics
PPTX
Virtual Machine Forensics
PPTX
Digital forensics
PPTX
Computer forensics toolkit
Network Forensics Intro
Cyber Forensics Module 1
Mobile Forensics
Computer forensics
Digital Forensics best practices with the use of open source tools and admiss...
Mobile Forensics
Anti forensics-techniques-for-browsing-artifacts
Operating System Forensics
Next Generation Memory Forensics
computer forensics
Windows forensic artifacts
Network Forensics
Open source network forensics and advanced pcap analysis
Digital Forensics
Computer forensic ppt
Linux forensics
Virtual Machine Forensics
Digital forensics
Computer forensics toolkit
Ad

Similar to Memory Forensics (20)

DOCX
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
PPTX
Memory Forensic: Investigating Memory Artefact
PPTX
Memory Forensic - Investigating Memory Artefact
PPTX
Cybersecurity and Digital Forensics.pptx
PPT
Preserving and recovering digital evidence
PPT
Electornic evidence collection
PPTX
DracOs Forensic Flavor
PPTX
Dracos forensic flavor
PDF
the Cyber - Forensics - Lab - Manual . pdf
PPT
PPT
Digital forensics
PPT
Digital Forensics
PDF
You suck at Memory Analysis
PPTX
unit 5 understanding computer forensics.pptx
PPT
Computer forensics
PDF
Modern Reconnaissance Phase on APT - protection layer
PPTX
Preserving cyber evidence in forensics investigations
PPTX
computer forensic tools-Hardware & Software tools
PPT
Basics of Digital Forensics, techniques and tools
PPT
DigitalForensicsDigitalForensics.pptDigitalForensics.ppt
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Memory Forensic: Investigating Memory Artefact
Memory Forensic - Investigating Memory Artefact
Cybersecurity and Digital Forensics.pptx
Preserving and recovering digital evidence
Electornic evidence collection
DracOs Forensic Flavor
Dracos forensic flavor
the Cyber - Forensics - Lab - Manual . pdf
Digital forensics
Digital Forensics
You suck at Memory Analysis
unit 5 understanding computer forensics.pptx
Computer forensics
Modern Reconnaissance Phase on APT - protection layer
Preserving cyber evidence in forensics investigations
computer forensic tools-Hardware & Software tools
Basics of Digital Forensics, techniques and tools
DigitalForensicsDigitalForensics.pptDigitalForensics.ppt
Ad

Recently uploaded (20)

PDF
Chevening Scholarship Application and Interview Preparation Guide
PDF
anganwadi services for the b.sc nursing and GNM
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
Nurlina - Urban Planner Portfolio (english ver)
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PDF
Journal of Dental Science - UDMY (2022).pdf
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PDF
Journal of Dental Science - UDMY (2020).pdf
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
Chevening Scholarship Application and Interview Preparation Guide
anganwadi services for the b.sc nursing and GNM
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
4. Diagnosis and treatment planning in RPD.pptx
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
Civil Department's presentation Your score increases as you pick a category
Nurlina - Urban Planner Portfolio (english ver)
PLASMA AND ITS CONSTITUENTS 123.pptx
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
Literature_Review_methods_ BRACU_MKT426 course material
UNIT_2-__LIPIDS[1].pptx.................
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
Journal of Dental Science - UDMY (2022).pdf
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
Journal of Dental Science - UDMY (2020).pdf
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
Disorder of Endocrine system (1).pdfyyhyyyy

Memory Forensics

  • 2. Outline • Introduction • What can be found in Memory • Overview of the process • Tools & Techniques • Various Formats • Memory Forensics in Context of Windows Device • Memory Forensics in Context of Linux Device • Hardware Approaches for Memory Forensics • Little discussion on the deference between Windows and Linux Forensics 2
  • 3. Introduction Digital analysis can be broadly studied under two headings a) Static or Dead analysis where, the target devices that are to be analyzed are shut down and b) Live analysis where, the system stays in the boot mode and is kept alive. The live analysis has become a need with the increase of cyber crime because individuals have started deleting the contents as soon as possible without saving the contents on the hard drive. Hence in order to retrieve more valuable information the forensic analyst needs to examine the volatile memory. 3
  • 4. Introduction What is Memory Forensics? 4 The science of examining the volatile or live memory is referred to as Memory Forensics.
  • 5. What can be found in Memory? What can be found in the Main Memory? a) Running Processes. b) Running Threads. c) Password/Keys other related information. d) Live registry hives (in case of windows only). e) Malware presence f) Malicious/ Suspicious activities g) Open Connections to the network In fact anything that processor works upon… 5
  • 6. Overview of the process Memory Forensics can be studied broadly under three categories: a) Acquisition of memory b) Analyzing the acquired data c) Recovering the evidence 6 Acquisition Analyze Evidences
  • 7. Tools & Techniques Tools used for the acquisition of the Memory a) For Windows Platform • Belkasoft Live RAM Capturer • FTK Imager • OSForensics • MadiantMemoryz • DumpIt etc. b) For Linux Platform • LiME (Linux Memory Extractor) • Second Look • Fmem etc. 7
  • 8. Tools & Techniques Tools used for Analyzing the acquired data a) For Windows Platform • Belkasoft Evidence Center • wxHexEditor • Autopsy • Volatility * b) For Linux Platform • Volatility * • The Sleuth Kit (TSK) etc. 8
  • 9. Various Formats Tools used for the acquisition of the Memory a) Raw Dump (.img/.dd) b) Windows Crash dump format (.bin) c) Memory dump (.mem) d) Commercial Tools Formats • Encase (.E01) • VMware (.Vmem) • FastDump Pro (hpak) 9
  • 11. 11