Download presentation
Presentation is loading. Please wait.
Published byClement Newman Modified over 9 years ago
1
how to discover ephemeral evidence with Live RAM analysis
2
Standard practice until very recently Many types of evidence lost ◦ Communications in social networks ◦ Data on running processes ◦ Open network connections ◦ Access to encrypted volumes ◦ Many-many more 1-8 Gb of potential evidence!
3
Essential for discovering important evidence Should become a standard procedure
4
Running processes and services System information ◦ e.g. time lapsed since last reboot Information about logged users Registry information Open network connections ARP cache Remnants of Instant Messenger chats Communications in social networks MMORPG games chats
5
Recent Web browsing activities ◦ including InPrivate modes and similar Recent communications via Webmails Information from cloud services Decryption keys for encrypted volumes Recently viewed pictures Running malware and trojans
6
Ephemeral nature of evidence Memory is gone in seconds Only the most recent data (e.g. Facebook chats)
7
Careful assessment of risk vs. potential benefits Capturing a memory dump for off-line analysis Continuing with live box analysis ◦ If you know why (e.g. secure VPN connections) ◦ If you evaluated the risks Memory dump is then analyzed on investigator’s PC
8
Official ACPO Guidelines for capturing memory dumps: Perform a risk assessment of the situation Install a capture device (e.g. USB flash drive) Run collection script Once complete, stop the device Remove the device Verify the output on a separate forensic investigation machine ◦ not the suspect system! Immediately follow with standard power-off procedure.
9
There are certain strict requirements for tools used for acquiring memory dumps: Kernel-mode operation Smallest footprint possible Portability Read-only access
10
What is kernel-mode? Why is that needed? ◦ Proactive RAM protection What if a tool uses user-mode? ◦ Zeroes instead actual memory ◦ Faked memory ◦ Destroying evidence ◦ Locking or rebooting computer
11
FTK Imager PMDump Both run in user mode Test your current memory dumping tool!
12
Karos: popular multi-user online game
13
Made some Karos chats, created RAM dump FTK Imager: all zeroes PMDump: no Karos chats found Belkasoft Live RAM Capturer: all chats perfectly found
14
Loading capturer application requires RAM memory ◦ Potentially overwriting evidence or important data Thus, smallest footprint is desired
15
Tool should be able to run from a thumb drive No installation allowed No third-party libraries should be counted on
16
All data should be stored to a removable device Collected data must fit No using 8 GB pen drives for acquiring 8 GB RAM No data alterations allowed on suspect’s machine
17
Small free utility satisfying all forensic requirements http://forensic.belkasoft.com/en/ram-capturer
18
Both 32 and 64 bit versions available Tiny:140 KB (32-bit) and 167 KB (64-bit) Runs in kernel mode Portable Read-only Successfully passes the “Karos test”
19
Technique to capture RAM from another machine ◦ Does not affect source computer memory Exploits a known security issue ◦ Issue exists in all three main OS’es (though patches are known) Based on DMA (direct memory access)
20
FireWire drivers are not disabled ◦ Mac OS disables them when OS is locked FireWire port exists Or special hardware inserted ◦ PCMCIA card ◦ CardBus ◦ ExpressCard See http://www.hermann-uwe.de/blog/physical- memory-attacks-via-firewire-dma-part-1- overview-and-mitigationhttp://www.hermann-uwe.de/blog/physical- memory-attacks-via-firewire-dma-part-1- overview-and-mitigation
21
Recent experiment Attack to encrypted smartphone memory Use ordinary freezer to slow down RAM leak Cooled phone is reset in fastboot mode ◦ Then special FROST software used Result: ◦ encryption keys found ◦ RAM memory captured ◦ lock screen keys cracked
22
No all-in-one silver bullet so far Belkasoft Evidence Center ◦ Finds chats, browsers, webmails, P2P, MMORPG, social networks remnants and many more Elcomsoft Forensic Disk Decryptor ◦ Extracts decryption keys for encrypted volumes Passware Kit Forensic ◦ Extracts decryption keys for encrypted volumes ◦ Captures RAM using Firewire attack
24
Leave me your business card Come visit us at our booth and leave your email address Also Write us to contact@belkasoft.comcontact@belkasoft.com Attend our FREE webinar at http://belkasoft.com http://belkasoft.com
25
Completely FREE fully featured one-month license for conference attendees! More info at http://belkasoft.com/trialhttp://belkasoft.com/trial
26
Live RAM Capturer is free, Evidence Center is a commercial product For all order-related questions please visit www.belkasoft.com www.belkasoft.com or contact us by sending an email to contact@belkasoft.com contact@belkasoft.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.