Introduction to Microsoft Windows Live Forensics Flashcards
There are a number of reasons why the current contents of a live system and its volatile information are of great interest:
- Assistance with static analysis
- Obtain passwords, key material, unencrypted data
- Reconstruct session and application information
- Identify network traffic and applications
In other cases taking down a system is undesirable:
- Forensic investigation may need to be conducted clandestinely
- Mission-critical systems may not be shut down, or downtime must be kept to a minimum
Most applications are not designed to minimise exposure of sensitive data in volatile memory:
- Passwords, cryptographic material but also application data is typically retained
- Even when memory is released, it is typically not overwritten for performance reasons
- Particularly on relatively quiescent systems with large amounts of RAM, this can result in retention of data long after a process has finished
- If such memory is re-used without being zeroed out, other processes may also leak this information
Most straightforward mechanisms for obtaining live memory require some level of operating system support:
- Physical memory access, dumping of memory content
* This typically implies synchronisation or locking, but may not always be feasible or desirable
Live Imaging Techniques - Two key problems are unavoidable in this context:
Volatility: Even if the target system is frozen during a snapshot, some background volatility inevitably remains
Artefacts: The very fact that observations are conducted will result in artefacts
Live Imaging Tool - Networking:
Various network interface activity monitors
Live Imaging Tool - Security:
Access rights checks, local and remote shares and access to these
Live Imaging Tool - Processes:
Real-time DLL, thread and process activity monitoring and dependencies among components
Live Imaging Tool - System Information:
Review Active Directory structures, memory mapping, file handles, live kernel debugging
Live Imaging Tool - File and Disk:
File system activity
Live Imaging Tool - Disk2VHD:
Capture an image and convert it to a virtual drive
Live Imaging Tool - Sysmon:
Allows logging and tracking of process activity
Live Imaging Tool - ProDiscover IR:
Agent running on target system performs low-level capture of RAM and disk content. This accesses the low-level interfaces and does not make use of interpretation layers such as device driver but may still be susceptible to subversion
Live Imaging Tool - EnCase:
OpenTex EnCase are parts of Open Text offerings. Law enforcement modules also capture memory and kernel structures whilst running an agent on local systems
Live Imaging Tool - FTK:
Access Data’ Forensic Toolkit also memory capture using an agent-based architecture