CF Lecture 07-Memory Forensics
CF Lecture 07-Memory Forensics
Zunera Jalil
Email: [email protected]
Quiz 2
Available on GCR
• Volatile information like system time, logged users, open files, network
information and others.
• Non-volatile information like file systems, registry settings, logs, devices,
slack space, swap file, indexes, partitions etc. these and many more
section under the heading Non-Volatile Information.
Windows memory like memory dumps and analysing dumps and
other aspects.
Caches, cookies and history analysis.
Recycle bins, documents, short cut files, graphics file, executable files
etc.
Volatile Information 4
https://www.windowscentral.com/how-check-your-computer-uptime-windows-10
Volatile Information 6
• During an investigation we will always need to know who all were logged on
to the system. Logging to a system can be remotely or locally. Information
like these can add logical view to a context or a situation. The logs can be
related to an event occurrence. Many tools are available like PsLoggedon,
Netsessions, logonsessions etc. to learn the instantaneous information of the
users
Volatile Information 7
• During an investigation we will always need to know who all were logged on
to the system. Logging to a system can be remotely or locally. Information
like these can add logical view to a context or a situation. The logs can be
related to an event occurrence. Many tools are available like PsLoggedon,
Netsessions, logonsessions etc. to learn the instantaneous information of the
users
Volatile Information-logonsessions 8
Volatile Information 9
• Similarly we can also get which files were open at the time of logged users.
This is also important many times as to co-relate whether which users were
using which files of the system. Tools that can be used to access information
pertaining opened files are: Netfile, PsFile, open files etc.
Volatile Information 10
netStat command
Volatile Information 12
https://github.com/volatilityfoundation/volatility/wiki/Memory-Samples
Most Common Methods and Formats of Memory Acquisition 24
• There are many different memory most common methods and formats
that are used today:
RAW Format/ Crash Dump :- Extracted from a live environment/Information
gathered by the operating system
Hibernation File :- A saved snapshot that your operating system can return to
after hibernating
Page File :- This is a file that stores similar information that is stored in your
system RAM
VMWare Snapshot :- This is a snapshot of a virtual machine, which saves its
state as it was at the exact moment that the snapshot was generated
• Once data is acquired , the process of examining the system, and any
suspicious activities will then be uncovered through Data carving
The Memory Forensic Tools 25
• There are both free and commercial products available on the market,
and many forensics investigators will have their own personal
preferences. Here are some examples:
Volatility Suite: This is an open source suite of programs for analyzing RAM,
and has support for Windows, Linux and Mac operating systems. It can
analyze RAW, Crash, VMWare dumps with no issues.
https://www.volatilityfoundation.org/
http://www.rekall-forensic.com/
https://www.howtoforge.com/tutorial/how-to-install-and-use-volatility-memory-forensic-tool/
The Memory Forensic Tools 26
• Belkasoft RAM Capturer: This is another forensic tool that allows for the
volatile section of system memory to be captured to a file. First
responders will find that the functionality and wide range of tools
available in this software package will allow for their investigations to
start off as quickly as possible.
https://belkasoft.com/ram-capturer
The Memory Forensic Tools 27
• Process Hacker:
• User Activity: By looking at the information that was acquired during all of
the previous steps, the forensic investigator can start to piece together a
fairly accurate series of events that led to the main incident.
This can be determined via the system log files that were captured
earlier, and can help to ascertain to what extent, if any, that a user on
site may have been involved.
Remote unauthorized access can also be detected, which can help
with determining the extent to which the network protocols of the
organization have been compromised.
Memory Forensics: Examining Captured Data 30
• Slack Space is the unused space in a disk cluster. The DOS and Windows
file systems use fixed-size clusters. Even if the actual data being stored
requires less storage than the cluster size, an entire cluster is reserved for
the file. The unused space is called the slack space.
• DOS and older Windows systems use a 16-bit file allocation table (FAT),
which results in very large cluster sizes for large partitions.
• For example, if the partition size is 2 GB, each cluster will be 32 K. Even if a
file requires only 4 K, the entire 32 K will be allocated, resulting in 28 K of
slack space. In computer forensics, slack space is examined because it
may contain meaningful data
Slack Space, Swap File, Deleted Files 35
• Most file systems, such as FAT and UNIX Fast File System, work with the
concept of clusters of an equal and fixed size.
For example, a FAT32 file system might be broken into clusters of 4 KB
each. Any file smaller than 4 KB fits into a single cluster, and there is
never more than one file in each cluster.
Files that take up more than 4 KB are allocated across many clusters.
Sometimes these clusters are all contiguous, while other times they are
scattered across two or potentially many more so called fragments,
with each fragment containing a number of contiguous clusters storing
one part of the file's data.
Obviously large files are more likely to be fragmented. File carving is a
highly complex task, with a potentially huge number of permutations to
try.
Slack Space, Swap File, Deleted Files 36
Swap Space
• Area on a hard disk which is part of the Virtual Memory of your machine,
which is a combination of accessible physical memory (RAM) and the
swap space.
• Swap space temporarily holds memory pages that are inactive. Swap
space is used when your system decides that it needs physical memory
for active processes and there is insufficient unused physical memory
available. If the system happens to need more memory resources or
space, inactive pages in physical memory are then moved to the swap
space therefore freeing up that physical memory for other uses.
Slack Space, Swap File, Deleted Files 37
• File Carving is a process used to extract data from a disk drive or other
storage device without the assistance of the file system that originality
created the file.
• A method that recovers files at unallocated space without any file
information and is used to recover data and execute a digital forensic
investigation.
• File carving is the process of reconstructing files by scanning the raw bytes
of the disk and reassembling them. This is usually done by examining the
header (the first few bytes) and footer (the last few bytes) of a file.
Understanding File Carving 39
• All file systems contain some metadata that describes the actual file
system. At a minimum the hierarchy of folders and files, with names for
each.
• File carving is the process of trying to recover files without this metadata.
This is done by analyzing the raw data and identifying what it is (text,
executable, png, mp3, etc.)
• Some .txt and email have neither header nor footer, this itself can be
identifier.
Understanding File Carving 40
View the image using any photo viewer to confirm it is same as the image
What is Operating System Forensics? 50
• https://resources.infosecinstitute.com/topic/file-carving/
• https://digital-forensics.sans.org/summit-archives/2010/eu-digital-forensics-incident-
response-summit-bas-kloet-advanced-file-carving.pdf
• https://medium.com/@lavineaoluoch/manual-file-carving-241a309b1f30
• http://index-of.co.uk/presentation/extra_carving_w4.pdf
Reading Task 53