0% found this document useful (0 votes)
22 views

Lab7.docx

This lab focuses on memory analysis using tools like Volatility and FTK Imager Lite to capture and analyze volatile memory from live systems. Participants will learn to identify, collect, and analyze digital artifacts while adhering to forensic investigation principles. The lab includes hands-on tasks for memory capture and analysis, along with reflective questions on preserving evidence and the role of AI in digital forensics.

Uploaded by

abrar.s7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Lab7.docx

This lab focuses on memory analysis using tools like Volatility and FTK Imager Lite to capture and analyze volatile memory from live systems. Participants will learn to identify, collect, and analyze digital artifacts while adhering to forensic investigation principles. The lab includes hands-on tasks for memory capture and analysis, along with reflective questions on preserving evidence and the role of AI in digital forensics.

Uploaded by

abrar.s7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

LAB: 07

This lab focuses on memory analysis.

Objective:
 Learn digital artifacts through Memory analysis with Volatility.

Leaning Activities:
At the end of these activities, you should understand:
 Engage in standard processes of identifying, collecting, and analyzing relevant digital artifacts
while keeping in mind the principles of sound forensic investigation, such as evidence
preservation, documentation, evidence-based conclusions and artifacts.

Tools to use:
- Volatility (volatility_2.6_win64_standalone.zip -> https://www.volatilityfoundation.org/26)
- Magnet Forensics RAM Capture (https://www.magnetforensics.com/resources/magnet-ram-capture/)
-Python (https://github.com/volatilityfoundation/volatility/blob/master/README.txt)

As you know, attackers often target servers or exploit employee workstations or end-user devices
through phishing, and these systems and devices are on practically all the time, or at least most of the
day. As such, acquiring images and/or potential evidence from a live machine is a likely situation in many
digital forensic investigations. However, when you encounter a victim system it may not be feasible to
shut it down, or an intruder may still be poking around the system/network and you may not want to
alert him or her to your presence. Besides, there is a plethora of potential evidence to be had from a
victim system left running in its current state. The volatile contents of RAM should be captured as a
snapshot of what is running on the system at that precise time, not to mention that it contains
information that is not necessarily kept on the system's physical drive. Let's start here and capture the
memory from the victim system.

There are many tools that can capture the memory from a live system, but we will be using FTK Imager
Lite from AccessData. It is a GUI tool and compared to some other similarly purposed command-line
tools, it leaves a larger footprint on the machine; however, all considering, its impact on the system is
still rather minimal and it tends to collect more reliable images. As an investigator, you will have to
decide if it is more acceptable to lose the volatile information contained in RAM or, alternatively, to
interact with the system and alter some information on the physical drive.

Task 1:
Memory Capture
1.1 Insert your USB stick. If necessary, connect it to the VM. Navigate to it in Windows Explorer and
execute FTK Imager Lite. Click Yes in the User Account Control window.

1
1.2. Find the little memory stick icon in the FTK Imager Lite toolbar. If you hold the mouse over it, it
should say 'Capture Memory'. Click it to view the Memory Capture window.

1.3. Select Browse and set your Destination Path to somewhere on your removable USB drive. Then, you
may change the name of the captured memory file to whatever you like. Note, FTK Imager will create a
raw memory capture, just be aware of different formats used in different tools. Leave the boxes
unchecked and click the Capture Memory button. This will take a little while as it is capturing XXGB of
memory.

1.4 When the capture has completed, the Status line should read 'Memory capture finished successfully'.
Now, you have captured the memory from a live system. Click Close, but keep FTK Imager Lite running.
We will analyze the memory capture later.

What is the size of the file (captured mem file)? ______5 gb____________________
(Take a screenshot of this result)

2
Note: You may use Magnet RAM Capture utility to capture memory.

Task-2:

Memory Analysis

For this part of the lab, you can disconnect your USB drive from the VM and make it accessible to your
main operating system. We will be using Volatility Framework to analyze the raw memory dump that you
saved to your USB drive. Volatility uses plugins, which makes it rather extensible, and the framework
provides a powerful and dynamic memory analysis tool used by many investigators throughout the
digital forensics community. I encourage you to explore this tool as much as possible. To start, you might
check out the basic usage instructions at the following link:
https://www.forwarddefense.com/pdfs/Memory-Analysis-with-Volatility.pdf.

2.1 Start a command shell and navigate to where your standalone Volatility executable is. Note, it may be
helpful to have your memory image and the standalone Volatility exe in the same directory, whether on
your USB drive or copied onto your main hard drive.

2.2 Typically, you would run the 'imageinfo' plugin to determine the proper profile to use with any
particular memory image you may be analyzing, but since that can take some time. In the shell, enter the
following command:
(Take a screenshot of this result)

3
C:\support\volatility\volatility_2.6_win64_standalone>volatility_2.6_win64_standalone.exe imageinfo -f c:\support\memdump1.raw

Note: The above command may take up to 15 minutes to display the output.

Ex:
“C:\support\volatility\volatility_2.6_win64_standalone” is the volatility utility directory
“C:\support\memdump1.raw “ is the captured mem file

2.3 Next, enter the following command:

(Take a screenshot of this result)

4
C:\support\volatility\volatility_2.6_win64_standalone>volatility_2.6_win64_standalone.exe
--profile=Win2012R2x64_18340 -f c:\support\memdump1.raw netscan

Note, it is often helpful to send the output to a text file, especially if you are using a Windows command
shell, it's just easier to read. The above command, which uses the 'netscan' plugin, lists all network
connections, protocols, IP addresses, ports, and associated processes.

What is the command to send the output of the above command to a text file for later analysis?
___________tee______________________________

2.4 To locate the virtual addresses of registry hives in memory, and the full paths to the corresponding
hive on disk, use the hivelist command. If you want to print values from a certain hive, run this command
first so you can see the address of the hives.

(Take a screenshot of this result)

5
C:\support\volatility\volatility_2.6_win64_standalone>volatility_2.6_win64_standalone.exe
--profile=Win2012R2x64_18340 -f c:\support\memdump1.raw hivelist

2.5 The next command would output list multiple hives (DEFAULT and ntuser.dat) contain the same key
“Software\Microsoft\Windows NT\CurrentVersion”. (Take a screenshot of this result)

6
C:\support\volatility\volatility_2.6_win64_standalone>volatility_2.6_win64_standalone.exe
--profile=Win2012R2x64_18340 -f c:\support\memdump1.raw printkey v-K "Software\Microsoft\Windows
NT\CurrentVersion"

2.6 Next, the following command would display a list of running process:

C:\support\volatility\volatility_2.6_win64_standalone>volatility_2.6_win64_standalone.exe
--profile=Win2012R2x64_18340 -f c:\support\memdump1.raw pslist

(Take a screenshot of this result)

7
2.7 Next command would display the process tree:

C:\support\volatility\volatility_2.6_win64_standalone>volatility_2.6_win64_standalone.exe
--profile=Win2012R2x64_18340 -f c:\support\memdump1.raw pstree

(Take a screenshot of this result)

8
2.8 To view the SIDs associated with aprocess, use the getsids command:

C:\support\volatility\volatility_2.6_win64_standalone>volatility_2.6_win64_standalone.exe
--profile=Win2012R2x64_18340 -f c:\support\memdump1.raw getsids

(Take a screenshot of this result)

2.9 What is the command to display the loaded DLLs? _____dlllist____________________________

3.0 What is the command to display process privileges detail? _________privs________________________

9
Reflective statements (end-of-exercise):
You should reflect on these questions:

1. How can the Forensics Investigators preserve volatile evidence at the crime scene?

The investigators uses tools to capture image of the volatile memory as evidence before getting the
system under investigation to be turned off. Registers, cache, routing table, temporary file systems, and
disk are all used to collect volatile evidence. remote logging and monitoring of data relevant to the
system under consideration.

2. How can the Forensics Investigators make use of Artificial Intelligence (AI) and Machine Learning
(ML) in digital forensics?
AI and machine learning are crucial in digital forensics. With these two tools, investigators can to
automate their processes so that content and insights are flagged quickly and thus take less time
uncover. Pattern detection and recognition capabilities of machine learning models can be used
in forensics analysis to uncover hidden evidence in digital artifacts that would have been missed
if performed manually.

3. What is the difference between artifacts and evidence?


A sign indicating that something exists or is true, or material presented to a court to assist in the truth
about something. A piece of evidence submitted to support a response to a question, such as text or a
reference to a resource. And an artifact if considered digital is the memorialization of user activity left
within a device or file, similar to digital fingerprints. When looking for artifacts of user activity, digital
forensic investigators will look in certain places.

References
1. https://www.volatilityfoundation.org/26
2. https://en.wikipedia.org/wiki/Memory_forensics
3. https://www.sans.org/reading-room/whitepapers/forensics/techniques-tools-recovering-
analyzing-data-volatile-memory-33049
4. https://www.sciencedirect.com/topics/computer-science/memory-forensics

10

You might also like