Finding Digital Evidence
Finding Digital Evidence
Physical Memory
Mariusz Burdach
Overview
• Introduction
• Anti-forensics
• Acquisition methods
• Windows memory analysis
• Linux memory analysis
• Detecting hidden data on a live system
• Q&A
Past, Present & Future
• Forensic Analysis = File System Forensic
Analysis
– Well-developed procedures for seizing digital
evidence from hard disk (i.e. Imaging a hard
disk)
– Quite difficult to tamper evidence during
collecting data
– Well-known methods of analysis
Past, Present & Future
• Some evidence is temporary stored in
swap space
• Some evidence resides only in storages
(i.e. volatile memory)
• Anti-forensics
– Data contraception
– Data hiding
– Data destruction
Analysis Types
Application
Analysis
Swap Space
Analysis
• VA (0x81965404) = PA (0x1D65404)
• driver_start (VA) = 0x804DE000
• Kernel image is loaded at (PA)
0x004DE000
Enumerating processes
• Debug section in the ntoskrnl.exe file
stores the PsInitialSystemProcess
symbol
• PsInitialSystemProcess = 0x4DE000 +
0x90EF4 (RVA) = (PA) 0x56EEF4
• 0x56EEF4 -> _EPROCESS (System)
Doubly Linked List
• EPROCESS
• MODULE_ENTRY
• etc
Processes’ details
• SID of process owner inside
ACCESS_TOKEN
• CreationTime in EPROCESS
– KeQuerySystemTime is called to save the
Process’s Create Time
– System time is a count of 100-nanosecond
intervals since January 1, 1601. This value
is computed for the GMT time zone.
Dumping memory mapped files
• Data Section Control Area
• Page Tables