Forensics Analysis  - Forensics analysis GBHackers - Live Forensics Analysis with Computer Volatile Memory
Forensics

The field of Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted  in electronic or magnetic form (that is, digital evidence)

Forensics Analysis – Volatile Data:

  • The data that is held in temporary storage in the system’s (including random access , cache , and the onboard of system peripherals such as the video card or NIC) is called volatile data because the memory is dependent on electric power to hold its contents.
  • When the system is powered off or if power is disrupted, the data disappears.

How to Collect Volatile Data:

  • There are lots of tools to collect volatile memory for forensics or incident response.In this, we are going to use Belkasoft live ram Capture Tool.
  • After the capture of live data of RANDOM ACCESS MEMORY, we will analyze with Belkasoft Evidence Center Ultimate Tool.

Also Read Windows Registry Analysis – Tracking Everything You Do on the System

Acquisition of live Volatile Memory:

Run the tool as administrator and start the capture.

- ram captutre - Live Forensics Analysis with Computer Volatile Memory

Dump File Format:

After successful capture of live Ram memory.The file is will be saved in .mem extension.

- ram2 1 - Live Forensics Analysis with Computer Volatile Memory

Evidence File Analyser:

Belkasoft Evidence Center Ultimate Tool to analyze volatile memory.

- evidence1 - Live Forensics Analysis with Computer Volatile Memory

As a forensic examiner or Incident Responder should record everything about physical device appearance, Case number, Model Number of Laptop or Desktop etc.

- eve2 - Live Forensics Analysis with Computer Volatile Memory

Click the Ram Image and enter the path of the .mem file which is live ram dump file.

Also Read Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

Malicious Activites on the Public website

- sql eve - Live Forensics Analysis with Computer Volatile Memory

In this above picture, the attacker is trying for SQL Injection on Public Website.

Anonymous Vpn

- eve9 - Live Forensics Analysis with Computer Volatile Memory

In this above figure attacker installed and executed Cyberghost Vpn for hiding the source ip address.

Mail Inbox

- eve6 - Live Forensics Analysis with Computer Volatile Memory

The attacker has logged on with some public mail servers, now forensic examiner able to read inbox emails.

Recent File Accessed

- eve3 - Live Forensics Analysis with Computer Volatile Memory

Attackers last accessed file directory paths.Forensics examiner will have priority to investigate this path for suspicious files.

Pictures

- eve7 - Live Forensics Analysis with Computer Volatile Memory

Recent Pictures downloaded from websites which will be stored in the cache memory.

There are many relatively new tools available that have been developed in order to
recover and dissect the information that can be gleaned from volatile memory.

This is a relatively new and fast-growing field many forensic analysts do not know or take
the advantage of these assets.

Volatile memory may contain many pieces of information relevant to a forensic investigation, such as passwords, cryptographic keys, and other data.Happy Investigating !!!

Also Read Intrusion Prevention System(IPS) and Its Detailed Function – SOC/SIEM



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here