7 - Memory Analysis Flashcards
Memory forensics
Dump and Analyze the RAM
Volatility framework
List processes, API hooks
Approaches to memory reconstruction
Tree and list traversal
Object fingerprint/pattern searches
Tree and list traversal
Find index into lists and tables of interesting structure and follow them through to reconstruct the data
Can stitch together more related records
Can miss unlinked, dead structures
Fingerprint/pattern searches
Search for relevant patterns in memory
Finds unlinked, dead structures and can work with imperfect dumps
Less context and susceptible to rubbish
Acquisition of volatile memory - what you want to have
High atomicity(how close to present memory) and availability
Software acquisition - User level application
Based on user-level applications for memory dumping
Good for incident scenarios and capturing forensic image even in situations with little time
Work on specific operating systems, applications must be loaded into memory before execution
Software acquisition - Kernel
Leverage a kernel driver to access physical memory without restrictions
This causes changes in the system state
Software acquisition - software crash dumps
Dump files on windows in case of machine failure. Could be invasive if explicitly triggered
Software acquisition - warm boot
Refers to reboot methods in which power is never removed from the memory module
Software acquisition - cold boot
Refers to reboot methods in which power is removed from the memory module
Hardware acquisition - dedicated hardware
Use of special hardware card to obtain forensic image of computers ram. The limitation is the prior installation of PCI card before its use