LO - 2 - Data Capture and Memory Forensics
LO - 2 - Data Capture and Memory Forensics
https://resources.infosecinstitute.com/topic/computer-forensics-to
ols/
https://tryhackme.com/room/windowsforensics1
APPLY THE TYPES OF TOOL THAT
SUPPORT PROFESSIONAL DIGITAL
INVESTIGATIONS AT A STRATEGIC LEVEL
• Forensic disk and data capture tools focus on analysis of a system and extracting
potential forensic artifacts, such as files, emails and so on. This is a core part of the
computer forensics process and the focus of many forensics tools.
• https://youtu.be/-UZo1wP_4GY
G. Bulk Extractor=Bulk Extractor is also an important and popular digital forensics tool.
• It scans the disk images, file or directory of files to extract useful information.
• In this process, it ignores the file system structure, so it is faster than other available similar kinds of tools.
• It is basically used by intelligence and law enforcement agencies in solving cybercrimes.
ACTIVITY – ANALYZE IMAGE USING
AUTOPSY
• About RAM
• https://youtu.be/PVad0c2cljo
• Types of memory
• https://youtu.be/ygElbzv1S_w
TERMS / TECHNOLOGY USED IN
MEMORY FORENSIC ANALYZE
• Volatality
• Dump formats
• Profiles
• Kernel Debug
• .raw files
• Hybernate system files
TERMS IN MEMORY FIORENSIC
• .raw file = It’s a file that contains an image of the system memory. It is a output file
generated after using Dumpit / Win32dd / Memoryze tools.
1. The Volatility
2. LIME
3. SIFT
1.THE VOLATILITY
• This distinguishes LiME as the very first method to support full memory
capturing on smartphone OS's such as Android (Schatz & Cohen, 2017).
• SIFT Workstation is nothing but a collection of open-source incident management and investigative software
that can be used to conduct comprehensive automated forensic investigations in a range of situations.
• It can be used in conjunction with any existing incident management and forensic tool set. It's similar to Kali
Linux, except it's built especially for forensics.
• SIFT can be installed on any Linux or Windows installation (Karampidis & Papadourakis, 2017)
• .
• SIFT supports processing of evidence in a variety of formats, like AFF, E01, as well as raw format (or DD).
• SIFT provides the following file systems support: ext2 as well as ext3 for Linux, then the HFS for Mac and
finally for windows it supports MS-DOS, FAT, NTFS and V-FAT.
LIVE MEMORY FORENSIC
• MEMORY FORENSICS
• VOLATALITY
• LIME
• SIFT
• LIVE MEMORY FORENSICS
• BELKASOFT LIVE RAM CAPTURER
• FTK IMAGER
• MADIANT MEMORYZE
• DUMPIT
2. ACTIVITY TO EXTRACT LOGS OF
HOST