SlideShare a Scribd company logo
2
Most read
7
Most read
14
Most read
आज का आहार
Memory Forensics

Varun Nair
@w3bgiant
#whoami
O Security enthusiast.
O For food and shelter, I work with ZEE TV
O For living, I learn 4N6, Malwares and Reverse

Engineering
O Recent developments:
O Chapter lead at Null, Mumbai chapter.
If you listen!!!!!
O Forensics Fundamentals
O Action Plan
O Order of Volatility
O Methodologies
O Dead Forensics

O Live Forensics
O Demo
ELSE!!!!
Forensics Fundamentals
O Digital forensics (sometimes known as digital forensic

science) is a branch of forensic science encompassing the
recovery and investigation of material found in digital
devices, often in relation to computer crime.

O "Gathering and analysing data in a manner as free from

distortion or bias as possible to reconstruct data or what
happened in the past on a system [or a network]“
-Dan Farmer / Wietse Venema
Action Plan- First Response
Arrive on
Crime scene

Machine state = OFF

DEAD
FORENSICS

Machine state = ON

LIVE
FORENSICS
Order of Volatility
MOST
…..
LEAST

• CPU, cache and register content
• Routing table, ARP cache, process table,
kernel statistics
• Memory
• Temporary file system / swap space
•Data on hard disk
•Remotely logged data
•Raw Disk Blocks
Forensics Methodologies
O “LIVE” Forensics

O “DEAD” Forensics
DEAD FORENSICS
O The dead analysis is more common to acquire data.
O A dead acquisition copies the data without the

assistance of the suspect’s (operating) system.
O Analysing a “dead” system that has had it’s power

cord pulled.
DEAD FORENSICS
O During data acquisition an exact (typically bitwise)

copy of storage media is created.
O Least chance of modifying data on disk, but “live”

data is lost forever.
LIVE FORENSICS
O Focuses on extracting and examination of the

volatile forensic data that would be lost on power
off
O A live acquisition copies the data using the

suspect’s (operating) system
O Live forensics is not a “pure” forensic response as

it will have minor impacts to the underlying
machine’s operating state
– The key is the impacts are known
LIVE FORENSICS
O Often used in incident handling to determine if an

event has occurred
O May or may not proceed a full traditional forensic

analysis
O If you work on a suspect’s system you should

boot/use trusted tools (e.g. CD, USB stick):
LIVE FORENSICS

THE IMAGE WILL HAVE
NO
AUTHENTICITY
No two images can have the “same hash value”
Forensic Response Principles
– Maintain forensic integrity
– Require minimal user interaction
– Gather all pertinent information to
determine if an incident occurred for later
analysis
- Enforce sound data and evidence collection
Methodology
ACQUIRE

CONTEXT

ANALYSE

•Capture
RAM
Memory

•Find
Memory
Offsets
and
establish
contexts

•Analyse
data and
recover
evidence
In MEMORY data??
O Current running processes and terminated

processes.
O Open TCP/UDP ports/raw sockets/active
connections.
O Caches
O -Web addresses, typed commands, passwords,

clipboards, SAM databases, edited files.
O Memory mapped files
O -Executable, shared, objects(modules/drivers), text

files.
DEMO
O Collecting Memory dumps:

DUMPIT by MOONSOLS

O Analysing Memory dumps:

WinHex and Volatility Framework 2.3
और कोई सवाल

More Related Content

What's hot (20)

PPTX
Incident response process
Bhupeshkumar Nanhe
 
PPTX
Network Forensics
primeteacher32
 
PDF
Database forensics
Denys A. Flores, PhD
 
PPTX
Autopsy Digital forensics tool
Sreekanth Narendran
 
PDF
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
PPTX
Mobile Forensics
primeteacher32
 
PPTX
Forensic imaging
DINESH KAMBLE
 
PPTX
mobile forensic.pptx
Ambuj Kumar
 
PPT
Anti-Forensics: Real world identification, analysis and prevention
Seccuris Inc.
 
PPTX
Introduction to Cyber Forensics Module 1
Anpumathews
 
PPTX
L6 Digital Forensic Investigation Tools.pptx
Bhupeshkumar Nanhe
 
PPTX
Windows Registry
primeteacher32
 
PPTX
Memory Forensics
Anshul Tayal
 
PPTX
Analysis of digital evidence
rakesh mishra
 
PPTX
Data recovery
gupta8741
 
PPTX
Computer forensics
deaneal
 
PPTX
Cyber forensics ppt
RoshiniVijayakumar1
 
PPTX
Network forensic
Manjushree Mashal
 
PPTX
Memory forensics
Sunil Kumar
 
PPT
Linux forensics
Santosh Khadsare
 
Incident response process
Bhupeshkumar Nanhe
 
Network Forensics
primeteacher32
 
Database forensics
Denys A. Flores, PhD
 
Autopsy Digital forensics tool
Sreekanth Narendran
 
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
Mobile Forensics
primeteacher32
 
Forensic imaging
DINESH KAMBLE
 
mobile forensic.pptx
Ambuj Kumar
 
Anti-Forensics: Real world identification, analysis and prevention
Seccuris Inc.
 
Introduction to Cyber Forensics Module 1
Anpumathews
 
L6 Digital Forensic Investigation Tools.pptx
Bhupeshkumar Nanhe
 
Windows Registry
primeteacher32
 
Memory Forensics
Anshul Tayal
 
Analysis of digital evidence
rakesh mishra
 
Data recovery
gupta8741
 
Computer forensics
deaneal
 
Cyber forensics ppt
RoshiniVijayakumar1
 
Network forensic
Manjushree Mashal
 
Memory forensics
Sunil Kumar
 
Linux forensics
Santosh Khadsare
 

Similar to Memory Forensics (20)

PPT
Computer forensics
Shreya Singireddy
 
PPTX
Cyber forensics 02 mit-2014
Muzzammil Wani
 
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Pace IT at Edmonds Community College
 
PDF
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
DOCX
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
smile790243
 
PDF
Automated Live Forensics Analysis for Volatile Data Acquisition
IJERA Editor
 
PPTX
N.sai kiran IIITA AP
sai Nagaragiri
 
PPT
CS426_forensics.ppt
Faiz430036
 
PPT
computer forensics
Akhil Kumar
 
DOCX
Criminalistics DB3NameClassDatePro.docx
faithxdunce63732
 
PDF
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
Wayne Norris
 
PPT
Computer Forensics
Alchemist095
 
PPTX
Sujit
Sujit George
 
PDF
ResearchPaperITDF2435
Manuel Garza
 
PPT
Digital Forensics
Nicholas Davis
 
PPT
Digital forensics
Nicholas Davis
 
PPTX
Digital Forensics Workshop
Tim Fletcher
 
DOCX
Cyber&digital forensics report
yash sawarkar
 
PDF
Debian Linux as a Forensic Workstation
Vipin George
 
PPT
3871778
Christiaan Beek
 
Computer forensics
Shreya Singireddy
 
Cyber forensics 02 mit-2014
Muzzammil Wani
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Pace IT at Edmonds Community College
 
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
smile790243
 
Automated Live Forensics Analysis for Volatile Data Acquisition
IJERA Editor
 
N.sai kiran IIITA AP
sai Nagaragiri
 
CS426_forensics.ppt
Faiz430036
 
computer forensics
Akhil Kumar
 
Criminalistics DB3NameClassDatePro.docx
faithxdunce63732
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
Wayne Norris
 
Computer Forensics
Alchemist095
 
ResearchPaperITDF2435
Manuel Garza
 
Digital Forensics
Nicholas Davis
 
Digital forensics
Nicholas Davis
 
Digital Forensics Workshop
Tim Fletcher
 
Cyber&digital forensics report
yash sawarkar
 
Debian Linux as a Forensic Workstation
Vipin George
 
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
 
PPTX
SSRF exploit the trust relationship
n|u - The Open Security Community
 
PDF
Metasploit primary
n|u - The Open Security Community
 
PDF
Api security-testing
n|u - The Open Security Community
 
PDF
Introduction to TLS 1.3
n|u - The Open Security Community
 
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
 
PDF
Talking About SSRF,CRLF
n|u - The Open Security Community
 
PPTX
Building active directory lab for red teaming
n|u - The Open Security Community
 
PPTX
Owning a company through their logs
n|u - The Open Security Community
 
PPTX
Introduction to shodan
n|u - The Open Security Community
 
PDF
Detecting persistence in windows
n|u - The Open Security Community
 
PPTX
Frida - Objection Tool Usage
n|u - The Open Security Community
 
PDF
OSQuery - Monitoring System Process
n|u - The Open Security Community
 
PDF
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
PDF
Extensible markup language attacks
n|u - The Open Security Community
 
PPTX
Linux for hackers
n|u - The Open Security Community
 
PDF
Android Pentesting
n|u - The Open Security Community
 
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
 
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Api security-testing
n|u - The Open Security Community
 
Introduction to TLS 1.3
n|u - The Open Security Community
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
 
Talking About SSRF,CRLF
n|u - The Open Security Community
 
Building active directory lab for red teaming
n|u - The Open Security Community
 
Owning a company through their logs
n|u - The Open Security Community
 
Introduction to shodan
n|u - The Open Security Community
 
Detecting persistence in windows
n|u - The Open Security Community
 
Frida - Objection Tool Usage
n|u - The Open Security Community
 
OSQuery - Monitoring System Process
n|u - The Open Security Community
 
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
Extensible markup language attacks
n|u - The Open Security Community
 
Ad

Recently uploaded (20)

DOCX
Lesson 1 - Nature and Inquiry of Research
marvinnbustamante1
 
PDF
WATERSHED MANAGEMENT CASE STUDIES - ULUGURU MOUNTAINS AND ARVARI RIVERpdf
Ar.Asna
 
PPTX
Exploring Linear and Angular Quantities and Ergonomic Design.pptx
AngeliqueTolentinoDe
 
PPTX
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
PDF
Lesson 1 - Nature of Inquiry and Research.pdf
marvinnbustamante1
 
PDF
AI-assisted IP-Design lecture from the MIPLM 2025
MIPLM
 
PDF
DIGESTION OF CARBOHYDRATES ,PROTEINS AND LIPIDS
raviralanaresh2
 
PDF
TLE 8 QUARTER 1 MODULE WEEK 1 MATATAG CURRICULUM
denniseraya1997
 
PDF
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
PDF
Free eBook ~100 Common English Proverbs (ebook) pdf.pdf
OH TEIK BIN
 
PDF
Indian National movement PPT by Simanchala Sarab, Covering The INC(Formation,...
Simanchala Sarab, BABed(ITEP Secondary stage) in History student at GNDU Amritsar
 
PPTX
Ward Management: Patient Care, Personnel, Equipment, and Environment.pptx
PRADEEP ABOTHU
 
PDF
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
PDF
Cooperative wireless communications 1st Edition Yan Zhang
jsphyftmkb123
 
PDF
Our Guide to the July 2025 USPS® Rate Change
Postal Advocate Inc.
 
PPTX
grade 8 week 2 ict.pptx. matatag grade 7
VanessaTaberlo
 
PPTX
Parsing HTML read and write operations and OS Module.pptx
Ramakrishna Reddy Bijjam
 
PPTX
How to Configure Refusal of Applicants in Odoo 18 Recruitment
Celine George
 
PDF
Lean IP - Lecture by Dr Oliver Baldus at the MIPLM 2025
MIPLM
 
PDF
IMPORTANT GUIDELINES FOR M.Sc.ZOOLOGY DISSERTATION
raviralanaresh2
 
Lesson 1 - Nature and Inquiry of Research
marvinnbustamante1
 
WATERSHED MANAGEMENT CASE STUDIES - ULUGURU MOUNTAINS AND ARVARI RIVERpdf
Ar.Asna
 
Exploring Linear and Angular Quantities and Ergonomic Design.pptx
AngeliqueTolentinoDe
 
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
Lesson 1 - Nature of Inquiry and Research.pdf
marvinnbustamante1
 
AI-assisted IP-Design lecture from the MIPLM 2025
MIPLM
 
DIGESTION OF CARBOHYDRATES ,PROTEINS AND LIPIDS
raviralanaresh2
 
TLE 8 QUARTER 1 MODULE WEEK 1 MATATAG CURRICULUM
denniseraya1997
 
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
Free eBook ~100 Common English Proverbs (ebook) pdf.pdf
OH TEIK BIN
 
Indian National movement PPT by Simanchala Sarab, Covering The INC(Formation,...
Simanchala Sarab, BABed(ITEP Secondary stage) in History student at GNDU Amritsar
 
Ward Management: Patient Care, Personnel, Equipment, and Environment.pptx
PRADEEP ABOTHU
 
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
Cooperative wireless communications 1st Edition Yan Zhang
jsphyftmkb123
 
Our Guide to the July 2025 USPS® Rate Change
Postal Advocate Inc.
 
grade 8 week 2 ict.pptx. matatag grade 7
VanessaTaberlo
 
Parsing HTML read and write operations and OS Module.pptx
Ramakrishna Reddy Bijjam
 
How to Configure Refusal of Applicants in Odoo 18 Recruitment
Celine George
 
Lean IP - Lecture by Dr Oliver Baldus at the MIPLM 2025
MIPLM
 
IMPORTANT GUIDELINES FOR M.Sc.ZOOLOGY DISSERTATION
raviralanaresh2
 

Memory Forensics

  • 1. आज का आहार Memory Forensics Varun Nair @w3bgiant
  • 2. #whoami O Security enthusiast. O For food and shelter, I work with ZEE TV O For living, I learn 4N6, Malwares and Reverse Engineering O Recent developments: O Chapter lead at Null, Mumbai chapter.
  • 3. If you listen!!!!! O Forensics Fundamentals O Action Plan O Order of Volatility O Methodologies O Dead Forensics O Live Forensics O Demo
  • 5. Forensics Fundamentals O Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. O "Gathering and analysing data in a manner as free from distortion or bias as possible to reconstruct data or what happened in the past on a system [or a network]“ -Dan Farmer / Wietse Venema
  • 6. Action Plan- First Response Arrive on Crime scene Machine state = OFF DEAD FORENSICS Machine state = ON LIVE FORENSICS
  • 7. Order of Volatility MOST ….. LEAST • CPU, cache and register content • Routing table, ARP cache, process table, kernel statistics • Memory • Temporary file system / swap space •Data on hard disk •Remotely logged data •Raw Disk Blocks
  • 8. Forensics Methodologies O “LIVE” Forensics O “DEAD” Forensics
  • 9. DEAD FORENSICS O The dead analysis is more common to acquire data. O A dead acquisition copies the data without the assistance of the suspect’s (operating) system. O Analysing a “dead” system that has had it’s power cord pulled.
  • 10. DEAD FORENSICS O During data acquisition an exact (typically bitwise) copy of storage media is created. O Least chance of modifying data on disk, but “live” data is lost forever.
  • 11. LIVE FORENSICS O Focuses on extracting and examination of the volatile forensic data that would be lost on power off O A live acquisition copies the data using the suspect’s (operating) system O Live forensics is not a “pure” forensic response as it will have minor impacts to the underlying machine’s operating state – The key is the impacts are known
  • 12. LIVE FORENSICS O Often used in incident handling to determine if an event has occurred O May or may not proceed a full traditional forensic analysis O If you work on a suspect’s system you should boot/use trusted tools (e.g. CD, USB stick):
  • 13. LIVE FORENSICS THE IMAGE WILL HAVE NO AUTHENTICITY No two images can have the “same hash value”
  • 14. Forensic Response Principles – Maintain forensic integrity – Require minimal user interaction – Gather all pertinent information to determine if an incident occurred for later analysis - Enforce sound data and evidence collection
  • 16. In MEMORY data?? O Current running processes and terminated processes. O Open TCP/UDP ports/raw sockets/active connections. O Caches O -Web addresses, typed commands, passwords, clipboards, SAM databases, edited files. O Memory mapped files O -Executable, shared, objects(modules/drivers), text files.
  • 17. DEMO O Collecting Memory dumps: DUMPIT by MOONSOLS O Analysing Memory dumps: WinHex and Volatility Framework 2.3