live memory acquisition for windows operating systems, naja davis

Upload: opexxx

Post on 30-May-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    1/24

    Live Memory Acquisition

    for Windows Operating

    Systems:

    CoverPageandAbstract

    ToolsandTechniquesforAnalysis

    Theliveacquisitionofvolatilememory(RAM)isanarea

    indigitalforensicsthathasnotgarneredmuchattention

    untilmostrecently. Theimportanceofthecontentsof

    physicalmemoryhasalwaystakenabackseattowhatis

    consideredmoreimportantthecontentsofphysical

    media. However,agreatdealofinformationcanbe

    acquiredfromRAManalysiswhichisunavailableduring

    mosttypical

    forensic

    acquisition

    and

    analysis.

    This

    paperwilltakealookatthedifferenttoolsavailableto

    theforensicexaminerformemoryacquisitionandhow

    toanalyzetheresultingdata.

    NajaDavis

    EasternMichiganUniversity

    IA328

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    2/24

    2

    TableofContents

    CoverPageandAbstract............................................................................................................................... 1

    I. Introduction ............................................................................................................................... ............... 3

    II. Scope........................................................................................................................................................3

    III. Toolsforlivememoryacquisition...........................................................................................................4

    Hardwarebasedsolutions ........................................................................................................................ 4

    Tribble ............................................................................................................................... ................. 4

    Firewire ................................................................................................................................................. 4

    Softwarebasedsolutions ......................................................................................................................... 5

    Limitationsofsoftwarebasedacquisition............................................................................................ 5

    DD(data

    dumper)..............................................................................................................................5

    Nigilant32 ............................................................................................................................... ............... 6

    ProDiscoverIR ............................................................................................................................... ........ 6

    KntDD ............................................................................................................................... ..................... 6

    MicrosoftCrashDump .......................................................................................................................... 7

    IV. MemoryAnalysis............................................................................................................................... ..... 7

    Basics: Whatdoesaninvestigatorneedtoknow? ..................................................................................7

    Tools..........................................................................................................................................................8

    V. Acquisition .............................................................................................................................................10

    SuggestedProceduresforLiveAcquisition:............................................................................................11

    VI.TestCase,StepbyStep .........................................................................................................................11

    VII.Conclusion.............................................................................................................................................21

    AppendixA..................................................................................................................................................22

    References ..................................................................................................................................................23

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    3/24

    3

    I. Introduction

    Untilrecently,theacquisitionofvolatilememory(RAM)hasbeenpracticedmainlyby

    thoseinvolvedinliveincidentresponseandlargelyignoredbythoseinthefield. Memory

    acquisitionfrom

    alive

    system

    requires

    specialized

    hardware

    or

    software

    not

    all

    forensic

    utilitiescanaccessthe\\.\PhysicalMemoryobjectinWindows. Theanalysisoftheresulting

    imagefilealsorequiresspecializedscriptsandknowledgetobeabletointerpretthedata.

    Thesetwofactorsmakememoryacquisitionandanalysismoredifficultthantraditionalforensic

    harddriveexaminations;itrequiresagreateramountofcarethanthecommonmethodof

    pullingthepowerandpreservingthecrimescene.

    However,withtheadventofMicrosoftVistaandBitLockerMicrosoftsanswertofull

    diskencryptionandtheincreasingsophisticationofmalware,rootkits,andotherviruses,live

    memoryanalysis

    has

    become

    even

    more

    important

    to

    the

    field

    of

    computer

    forensics.

    Importantdatasuchaspasswords,IPaddresses,whatprocesseswererunning,andotherdata

    thatmightnotbestoredontheharddrivecanberetrievedfromamemorydumporimage.

    Malwareandrootkitsoftenleavetracesinresidentmemorythatcannotbefoundbyanalyzing

    aharddriveimage.

    TheDigitalForensicResearchWorkshop(DFRWS)[1],issuedamemoryanalysis

    challengeinthesummerof2005,toencourageresearchandtooldevelopmentinlivememory

    acquisition. Thischallengeproducedtwowinners,ChrisBetzandtheteamofGeorgeM.

    Garner,Jr.andRobertJanMora,whodevelopedtoolstocompletethechallenge. Memparser

    [2],Chris

    Betzs

    winning

    entry,

    reconstructs

    processes

    lists

    and

    extracts

    information

    from

    processmemory. GarnerandMoradevelopedkntlist,whichenablesanexaminertodumpthe

    physicalmemoryfromWindowsandextractinformationfromtheresultingfile. Thesetwo

    workshavespurredinterestinthefieldoflivememoryacquisitionandtheissuessurrounding

    it.

    II. Scope

    Alltools

    and

    procedures

    in

    this

    document

    apply

    only

    to

    the

    Windows

    family

    of

    operating

    systems,includingWindows2000,XP,Vista,andServer2003.

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    4/24

    4

    III. Toolsforlivememoryacquisition

    Hardware-basedsolutions

    Tribble

    TheTribble[3]wasintroducedinFebruary2004intheDigitalInvestigationJournalbyBrianCarrierandJoeGrand,ofGrandIdeaStudio,Inc. TheTribbleisahardwareexpansion

    cardwhichcanbeusedtoretrievethecontentsofphysicalmemory. ItisaPCIexpansioncard

    designedtobeinstalledonaserverbeforetheevent,withaswitchthatisenabledwhenthe

    investigatorwantstocapturedata.

    Thismethodofacquisitionhasitsstrengthsandlimitations. Asahardwaredevice,the

    Tribblecan

    access

    physical

    memory

    without

    introducing

    any

    software

    onto

    the

    target

    system,

    minimizingtheimpactonthedatabeingretrieved. However,itmustbeinstalledpriortothe

    incident,makingitsomewhatinconvenientforontheflyacquisition. Itisalsostillaproofof

    conceptdeviceandnotwidelyavailable.

    Firewire

    Thesecondhardwaresolutionavailableforlivememoryacquisitionisthroughtheuse

    ofaFirewire

    device.

    Firewire

    devices

    use

    direct

    memory

    access

    (DMA),

    without

    having

    to

    go

    throughtheCPU. Thememorymappingisperformedinhardwarewithoutgoingthroughthe

    hostoperatingsystem,whichallowsnotonlyforhighspeedtransfersbutalsobypassesthe

    problemwithsomeversionsofWindowsthatdonotallowmemorytobeaccessedfromUser

    mode.

    AdamBoileau[4]developedsoftwareusingPythontoextractphysicalmemoryfroma

    systemonLinux. ThistoolcanbeusedonWindowssystemsaswell,bytrickingWindowsinto

    givingtheuserDMAbymasqueradingasaniPod. Thismethodismoreconvenientthanthe

    aforementionedTribble

    device,

    as

    most

    systems

    today

    have

    Firewire

    ports

    available

    (usually

    builtrightintothemotherboard). Thecurrentproblemwiththismethodisanissuewiththe

    UpperMemoryArea(UMA)whichcausessomesystemstosuffercrashesduringtheacquisition

    process[5].

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    5/24

    5

    Software-basedsolutions

    Limitationsofsoftware-basedacquisition

    WiththereleaseofServicePack2forWindowsXPthe\\.\PhysicalMemoryobjectisno

    longeraccessiblefromusermode. ThisisalsotrueforWindowsVistaandWindowsServer

    2003(ServicePack1) itcanonlybeaccessedviakernelmodedrivers. Assuch,someutilities

    whichmayhaveworkedinthepastwillnolongerworkonversionsofWindows. Theymaystill

    applytoearlierorunpatchedversions,however.

    Oneissuethattheforensicinvestigatorneedstoremainmindfulofduringlivememory

    acquisitionwithsoftwarebasedtoolsisthepotentialchangetodataduringtheacquisition

    process. DuetothevolatilenatureofRAM,introducinganynewsoftwareontothesystemmay

    changethe

    data

    which

    currently

    resides

    in

    memory.

    The

    memory

    introduced

    to

    the

    system

    will

    displacethedatathatpreviouslyoccupiedthatspace. Theimageacquiredmayalsopresenta

    smearedpictureofthedata,sincethesystemisliveandpagesarechangingastheacquisition

    progresses.Thisiscertainlynotidealforforensicallysoundacquisitionandsubsequentanalysis

    andmustbegivendueconsideration,particularlywhenevidentiaryrulesandstandardsapply.

    DD(datadumper)

    DD,betterknownasthedatadumpertoolfromUNIX,isprobablyfamiliartomost

    forensicinvestigatorsasatoolforcreatingforensicimagesofharddrivesandisincludedin

    manyopensourceforensicutilitiessuchasHelix(http://www.efense.com/helix/). TheDD

    formatisalsosupportedbymostmajorforensicapplications. ForensicAcquisitionUtilities

    (FAU)[6]usesamodifiedversionofthedatadumpertoolwhichiscapableofaccessingthe

    \\.\PhysicalMemoryobjectinWindows. UnfortunatelyFAUwillonlyworkonversionsearlier

    thanWindowsXPServicePack2,WindowsVista,orServer2003ServicePack1,asitaccesses

    thePhysicalMemoryfromusermode. (Note: ThemostrecentversionofFAUdoesnotinclude

    aversionofDDthatworksformemoryacquisitionpreviousversionsarestillviablehowever).

    Also,notallversionsofDDwillallowaccesstothe\\.\PhysicalMemoryobject.

    http://www.e-fense.com/helix/http://www.e-fense.com/helix/http://www.e-fense.com/helix/http://www.e-fense.com/helix/
  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    6/24

    6

    Nigilant32

    Nigilant32[7]isatooldevelopedbyAgileRiskManagementthatallowsaninvestigator

    topreviewaharddisk,imagememory,andtakeasnapshotofcurrentrunningprocessesand

    openports

    on

    the

    target

    system.

    Nigilant32

    has

    asmall

    footprint,

    using

    less

    than

    1MB

    in

    memorywhenloaded,supportingAgilesclaimofminimalimpactduringacquisition. The

    programiscurrentlyinbeta,however,itisfreetodownloadanduseoffoftheirwebsite.

    ProDiscoverIR

    TechnologyPathwaysforensicacquisitiontool,ProDiscover[8],isanincidentresponse

    toolthatallowsinvestigationofalivesystemanywhereonthenetwork. Theinvestigationcan

    includeimagingofphysicalmediaormemory,however,useofthistoolrequiresaserverapplet

    tobeinstalledonthetargetsystempriortoacquisitionviaremovablestoragemediasuchasa

    USBdriveorCD. Thisrequirementmakesthisparticulartoolnotasdesirableachoiceforfield

    acquisitionandperhapsbettersuitedtoacorporatenetworkenvironment. (Note: Thistoolis

    restrictedbythekernelmodedriverrequirementforaccessing\\.\PhysicalMemoryincertain

    versionsofWindows).

    KntDD

    KntDDisamemoryacquisitiontooldevelopedbyGeorgeGarner(alsoresponsiblefor

    theForensicAcquisitionToolkit)asapartofKntTools[9]. GarnerdevelopedKntToolsin

    responsetotherestrictionofaccessing\\.\PhysicalMemoryfromUsermodeandsupports

    Windows2000throughVista. Imagescanbeacquiredtoalocalremovabledriveoracrossthe

    network. ItalsoallowstheinvestigatortoconvertarawimagetoMicrosoftcrashdump

    format,sothedatacanbeanalyzedusingtheMicrosoftDebuggingTools. Thistoolisonly

    availabletolawenforcementorsecurityprofessionals.

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    7/24

    7

    MicrosoftCrashDump

    AnalyzingcrashdumpsisanotherwaytoobtaininformationonthecontentsofRAM.

    Unlikeothersoftwaremethodsofmemoryacquisition,theimageobtainedbyacrashdumpis

    anunaltered

    copy

    of

    the

    contents

    of

    asystems

    memory

    at

    the

    time

    the

    crash

    occurred.

    There

    isnointroductionofsoftwaretothesystemthatwillalterthecontentsofmemory. The

    drawbacktothismethodisthatcrashdumpsonlyoccurwhenthereisaproblemwiththe

    system. Thereisamethodtoinduceacrashdump;however,itrequiresanentryintheregistry

    alongwitharebootbeforeitisuseable[10],renderingitineffectiveforfieldacquisition.

    Despitethisshortcoming,itisstillimportantforaninvestigatortofamiliarwithcrash

    dumpsastheycanprovidevaluableinformationaboutasystem. NotallversionsofWindows

    generatefullcrashdumpsandmaygeneratesmallersizeddumps. Thesefilescanbeanalyzed

    withtheWindowsDebuggingTools[11]andcangivetheinvestigatorameanstopracticeand

    becomefamiliarwithmemoryanalysis.

    IV. MemoryAnalysis

    Basics: Whatdoesaninvestigatorneedtoknow?

    TheEProcessstructureiswhatrepresentsaprocessonaWindowssystem. Itincludes

    informationonthedifferentattributesoftheprocessalongwithpointerstootherattributes

    anddatastructureswhicharerelatedtoit. However,EProcessblockstructurevariesbetween

    operatingsystems,includingbetweendifferentversionsofWindows. Typically,theoffsetsvary

    fromversiontoversion. ItisimportanttomakenoteoftheversionofWindowsthatthe

    memoryimageordumpistakenfrom,asthiswillaffectwhattoolsyoumaybeabletouseto

    extractinformation. Thiscanbedonemanually,however,itrequiresabitmoreindepth

    knowledgeofWindowsmemorymanagementthanthispapercovers. HarlanCarveyhas

    written

    a

    Perl

    script

    [12],

    osid.pl,

    which

    will

    identify

    the

    operating

    system

    of

    an

    image.

    TheEProcessblockcontainstheprocessenvironmentblock(PEB)whichisveryvaluable

    toaforensicinvestigatorinthatitincludespointerstotheloaderdata,suchasmodulesused

    bytheprocess. Thisisparticularlyusefulinmalwareorrootkitanalysis,butcanalsohelp

    presentaclearerpictureastowhatexactlywasgoingoninthesystematthetimeinquestion.

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    8/24

    8

    ThePEBalsoshowsuswheretheimageoftheexecutablelies,theDLLpaths,andthecommand

    lineusedtolaunchtheprocess.

    Oneissuethatinvestigatorsneedtobeawareofwhenexamininganimageofmemory,

    isthatmostlikelyitisnotacompletepicture. Windowsmemorymanagementusesvirtual

    addressingwhich

    assigns

    pointers

    to

    the

    true

    location

    of

    the

    physical

    data.

    According

    to

    Jesse

    KornbluminhisUsingeverypartofthebuffaloinWindowsmemoryanalysis[13],most

    memoryanalysistoolsuseanaveformoftranslationwherepageswithinvalidpointersare

    ignored. Memorypageswhichhavebeenswappedoutduetopagingwillnotshowupina

    memorydump,althoughtheyareonthesysteminthepagefile. Allthetoolstestedinthis

    paperdonot(asfarasthisauthorisaware),includethepagefile. Therearetoolsin

    developmenttoaddressthisissue,althoughnonearepubliclyavailable(yet).

    Tools

    Duetothediligenceofthecomputerforensicscommunity,therearequiteafewtools

    availabletotheinvestigatorwithwhichtoanalyzememorydumps. Sometechnicalknowledge

    orfamiliaritywithcommandlineinteractionisrecommendedasmanyoftheavailabletoolsare

    scriptswhichmustbeexecutedfromacommandprompt. Thereareonlyafewtoolswhich

    haveaGUIinterface.

    Thefollowingisalistoftoolswhichcanbeusedtoextractprocessandother

    informationfrommemorydumps(linkstodownloadlocationswillbeincludedinAppendixAof

    thisdocument):

    Tool OperatingSystem

    Whatitdoes Requirements

    Lsproc.pl Windows

    2k

    Locatesprocesses Perl(http://www.perl.org)

    Lspd.pl Windows

    2k

    Listsdetailsof

    processes

    Perl(http://www.perl.org)

    Osid.pl Any IdentifiesOSof Perl(http://www.perl.org)

    http://www.perl.org/http://www.perl.org/http://www.perl.org/http://www.perl.org/http://www.perl.org/http://www.perl.org/
  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    9/24

    9

    Windows memoryimage.

    PoolFinder(part

    ofPoolTools)

    Windows

    2k,XP

    Findsallocationsof

    OSkernelin

    memorydumpand

    pagefile.

    Perl(http://www.perl.org)

    PoolGrep(partof

    PoolTools)

    Windows

    2k,XP

    Findsstringsinpool

    allocations

    Perl(http://www.perl.org)

    PoolDump(part

    ofPoolTools)

    Windows

    2k,XP

    Hexdumpofall

    allocationsfora

    selectedclass.

    Perl(http://www.perl.org)

    PTFinder Windows

    2k,XP

    Includesallscripts

    inPoolTools

    as

    well

    asosid.pl,buthasa

    GUI. Produces

    graphicaloutputof

    processesand

    threads.

    Perl(http://www.perl.org)

    Graphviz(http://www.graphviz.org/)

    and

    ZGRViewer

    (http://zvtm.sourceforge.net/zgrviewer.ht

    ml)toviewthegeneratedgraphicfile.

    FTimes

    Windows

    NT,XP,2KComprehensive

    toolkitwithvarious

    memoryanalysis

    functions.

    Ifrunning

    in

    aWindows

    environment,

    you

    willneedVisualStudioinordertocompile

    andrunthecode. Requiresadvanceduser

    knowledge.

    Volatility Windows

    NT,XP,2K

    Comprehensive

    toolkitwithvarious

    memoryanalysis

    functions.

    NeedsPythontorun. Thiscanbe

    accomplishedintheWindowsenvironment

    byinstallingCygwin

    (http://www.cygwin.com/)

    Theabovetoolsmainlydealwithprocessinformation,whichiswherethebulkof

    memoryforensicanalysishasbeenfocused. Otherdatacanbeextractedfromamemoryimage

    aswell,suchasusernames,passwords,andemailaddresses. Agoodstringsearchutility,such

    http://www.perl.org/http://www.perl.org/http://www.perl.org/http://www.perl.org/http://www.graphviz.org/http://zvtm.sourceforge.net/zgrviewer.htmlhttp://zvtm.sourceforge.net/zgrviewer.htmlhttp://www.cygwin.com/http://www.cygwin.com/http://zvtm.sourceforge.net/zgrviewer.htmlhttp://zvtm.sourceforge.net/zgrviewer.htmlhttp://www.graphviz.org/http://www.perl.org/http://www.perl.org/http://www.perl.org/http://www.perl.org/
  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    10/24

    asfind.exeorstrings.exeisessential. ForensicToolssuchasAccessDatasForensicToolkit[14]

    canbeusedtodatacarvetoretrievedocuments,graphicfiles,orwebpages. Oneimportant

    noteaboutdatacarvedfrommemoryimagesistokeepinmindthatthedatawasretrieved

    undervolatileconditions. Assuch,filesretrievedfrommemorymaybedegradedduetothe

    data

    not

    being

    static.

    This

    is

    illustrated

    by

    the

    following

    picture,

    carved

    from

    a

    test

    memory

    image:

    V.Acquisition

    Duetothevolatilenatureofliveforensics,aninvestigatorneedstodevelopastandard

    setofprocedures. Thisisimportantnotonlytoinsurethattheinvestigatorknowsexactlywhat

    10

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    11/24

    11

    todowhenarrivingonthescene,butalsosotherearenounexpectedconsequencessincethe

    systemislive unintentionallychangingdataonthetargetsystemcouldinvalidatetheacquired

    evidenceandalsocauseittobeinadmissibleinacourtoflaw. Beforeattemptingalive

    acquisition,aninvestigatorshouldtesttheirtoolset(s)extensively,undervaryingconditions

    (VMware

    [15]

    is

    excellent

    for

    this).

    SuggestedProceduresforLiveAcquisition:

    1. Documentallsteps. Thisisnotonlyimportantforevidentiaryreasons,butalsofortheinvestigatorsownreference.

    2. Isthesystemlocked? Ifso,thatwillchangetheacquisitionprocess. Ifyoucannotobtain

    apassword

    for

    access,

    then

    live

    acquisition

    may

    not

    be

    possible.

    Currently,

    no

    softwareutilitiescanimage\\.\PhysicalMemorywithoutfullaccess.

    3. Donotcloseanywindowsorcloseanydocuments/programsleavethemrunning. Byclosingawindoworprogramyoumaybeterminatingaprocess,whichwillaffectwhatis

    occurringonthesystematthattime.

    4. Limittheacquisitionprocesstoasfewstepsaspossible,whenitcomestointeractingwiththetargetsystemfewersteps=lessimpactonthesystem.

    5. Usetoolsthathaveassmallafootprintaspossible. Nigilant32(thisauthorsrecommendedchoice)useslessthan1MBofmemory;Helixuses17MB.

    VI.TestCase,Step-by-Step

    Testsystem:

    VMWare,Windows

    XP

    Professional

    Service

    Pack

    2

    IntelDualCoreProcessor2.6MHz

    512MBRAM

    Toolusedforimageacquisition: Nigilant32

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    12/24

    Desktopbeforeliveacquisition:

    AOLInstantMessengercanbeseenrunning.

    1. ForthisacquisitionIchosetouseaUSBthumbdriveforstoringtheimage.Investigatorsshouldremembertowipemediathoroughlybeforeeachacquisition,so

    remnantsofdatafrompreviousimagesarenotafactorinanalysis.

    AfterinsertingyourCDwiththeNigilantsoftwareonit,browsetoMyComputerand

    explorethedrive(ifitdoesntalreadyopenduetoAutoRun). RuntheNigilant32

    executableandgotoToolsSnapshotComputer. Thisoptionwillenumeratethe

    currentlyrunningprocesses,users,andopenportsandallowtheinvestigatortosave

    thisdatatoaplaintextfile. Savethetextfiletoyourthumbdrive,namingit

    appropriately. Youcanalsoenumerateprocessesviaotherscriptsafterimage

    acquisition,ifyouwishtovalidatethisoutput.

    12

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    13/24

    Note: YoucanputtheNigilantexecutableonthethumbdriveandrunitfromthere,

    however,bemindfulifyourdatawillbeusedasevidence. Itmaybebesttoburnittoa

    CDwithyourothermemoryacquisitiontools,sothereisnoquestionastotheintegrity

    ofyourimage.

    2. Aftersavingthetextfile,browsetoToolsImagePhysicalMemory. ApromptwillappearclickonStart

    13

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    14/24

    Youwillbepromptedtochoosealocationandnameforyourimage.

    14

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    15/24

    Acquiringphysicalmemorytakesabitoftime,aswithnormaldataacquisition.Aprogress

    indicatorwillappeartoletyouknowhowfaralongyouare:

    3. Aftertheimageiscomplete,closetheNigilantsoftware. Unfortunately,Nigilantdoesnothaveanabilitytohashtheimagefileafteracquisitiontheinvestigatorwillhaveto

    dothisbeforebeginninganalysis.

    4. Beforebeginninganalysis,theinvestigatorshouldmakeanothercopyofthememoryimage

    to

    work

    on

    never

    work

    on

    the

    original

    media!

    Since

    this

    isnt

    like

    ahard

    drive

    acquisition,thereisnooriginalphysicalmediatheimagewejustmadeistheoriginal.

    Forevidentiarypurposes,itisagoodpracticetohashtheoriginalmedia(thethumb

    drive)andthememoryimageandmakeaworkingcopyofthememoryimagebefore

    proceedingwithanalysis.

    15

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    16/24

    5. Asdiscussedearlier,memoryanalysisdiffersfromharddriveanalysisinthatevenslightchangesinoperatingsystemversion(Windows2kvs.WindowsXP)willdeterminewhich

    toolswillbethemosteffective. Nigilant32hasdonealotoftheworkforusalready,by

    providinguswithasnapshotoftheOSversion,runningprocesses,users,andopen

    network

    ports:

    16

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    17/24

    Aninvestigatorcouldverifyoutputbyrunninganotheranalysistoolandenumeratingthe

    processes. IwilldemonstratethisherebyusingPTFinder:

    PTFinderisaGUIinterfaceforAndreasSchustersPoolTools. Onceyouvechosenyour

    dumpfileandoptions,itwillgenerateatextfileandagraphicfileoftherunningprocesses.

    Weareonlyinterestedinthetextfileatthistime. AfterclickingExecuteyouwillbe

    promptedtorunabatchfileclickYes.

    17

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    18/24

    ADOSpromptwillopenup:

    Whentheanalysisiscomplete,PTFinderwillcloseonitsown.

    18

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    19/24

    Theresultingtextfilelookslikethis:

    TheoutputfromPTFinderisnotascleanaswhatyouwillseefromNigilant,butprovides

    morethanenoughinformationtocomparerunningprocesses. Note: PTFinderwillnot

    providenetworkinformationorusers,onlyprocessinformation.

    19

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    20/24

    6. Nowthatwehaveprocessinformation,wecanproceedwithanalyzingtheimagefilewithothertools. Inthiscase,wewilluseForensicToolkit:

    Afteranalyzingtheimagetheinvestigatorcanexaminecarveddataandperformstringsearches

    aswithanormalimagefile.

    20

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    21/24

    21

    VII.Conclusion

    Whiletherearemanytoolsavailableforlivememoryacquisitionandanalysis,itisstilla

    relativelynewendeavorintheareaofdigitalforensics;manyofthetoolsandtechniques

    developedthus

    far

    are

    still

    in

    the

    growing

    phase

    and

    require

    refinement.

    Todays

    computer

    forensicinvestigator,inordertobesuccessful,willneedtobewellinformedandbeintimately

    familiarwiththeinternalworkingsofWindowsmemorymanagementinordertoacquirea

    completepictureofmemoryfromanevidentiarystandpoint. Thankfullytherehavebeenmany

    forensicinvestigators,suchasHarveyCarlan,AndreasSchuster,andMariuszBurdachwhohave

    startedalongthepathandcreatedafoundationforotherstobuildupon. Asthetoolsbecome

    betterandtheproceduresmoresound,examinerswillhaveanewweaponintheirarsenalto

    utilizeduringforensicinvestigations.

  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    22/24

    22

    AppendixA

    Lsproc.plhttp://sourceforge.net/project/showfiles.php?group_id=164158

    Lspd.pl

    http://sourceforge.net/project/showfiles.php?group_id=164158

    Osid.plhttp://sourceforge.net/project/showfiles.php?group_id=164158

    PoolTools(PoolFinder,PoolGrep,PoolDump)

    http://computer.forensikblog.de/en/2007/11/pooltools_1_3_0.html

    PTFinderhttp://computer.forensikblog.de/en/2006/03/ptfinder_0_2_00.html

    FTimes http://ftimes.sourceforge.net/FTimes/

    Volatility

    https://www.volatilesystems.com/VolatileWeb/volatility.gsp

    http://sourceforge.net/project/showfiles.php?group_id=164158http://sourceforge.net/project/showfiles.php?group_id=164158http://sourceforge.net/project/showfiles.php?group_id=164158http://computer.forensikblog.de/en/2007/11/pooltools_1_3_0.htmlhttp://computer.forensikblog.de/en/2007/11/pooltools_1_3_0.htmlhttp://computer.forensikblog.de/en/2006/03/ptfinder_0_2_00.htmlhttp://ftimes.sourceforge.net/FTimes/http://ftimes.sourceforge.net/FTimes/https://www.volatilesystems.com/VolatileWeb/volatility.gsphttps://www.volatilesystems.com/VolatileWeb/volatility.gsphttp://ftimes.sourceforge.net/FTimes/http://computer.forensikblog.de/en/2006/03/ptfinder_0_2_00.htmlhttp://computer.forensikblog.de/en/2007/11/pooltools_1_3_0.htmlhttp://sourceforge.net/project/showfiles.php?group_id=164158http://sourceforge.net/project/showfiles.php?group_id=164158http://sourceforge.net/project/showfiles.php?group_id=164158
  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    23/24

    23

    References

    1. DigitalForensicsResearchWorkshop,DFRWS,http://www.dfrws.org/. [AccessedMarch15,2008]

    2. C.Betz,Memparser,http://sourceforge.net/projects/memparser. [AccessedMarch15,2008]

    3. B.D.CarrierandJ.Grand,AHardwareBasedMemoryAcquisitionProcedureforDigitalInvestigationsJournalofDigitalInvestigations,March2004.

    4. A.Boileau,FirewireandDMA,March2008,http://www.storm.net.nz/projects/16.[AccessedMarch16,2008].

    5. A.Vidstrom,MemorydumpingoverFirewireUMAIssues,http://www.ntsecurity.nu/onmymind/2006/20060902.html.[AccessedMarch16,

    2008].

    6. G.Garner,ForensicAcquisitionUtilities,November2007,http://gmgsystemsinc.com/fau/. [AccessedMarch20,2008].

    7. AgileRiskManagement,Nigilant32, http://www.agilerm.net/publications_4.html.[Accessed

    March

    20,

    2008].

    8. TechnologyPathways,ProdiscoverIR,http://www.techpathways.com/ProDiscoverIR.htm.[AccessedMarch20,2008].

    9. GMGSystems,Inc,KntToolswithKntList,http://www.gmgsystemsinc.com/knttools/.[AccessedMarch20,2008].

    10.Microsoft,Inc.,Windowsfeatureletsyougeneratememorydumpfilebyusingthekeyboard,

    December

    2007,

    http://support.microsoft.com/kb/244139.

    [Accessed

    March21,2008].

    http://www.dfrws.org/http://sourceforge.net/projects/memparserhttp://www.storm.net.nz/projects/16http://www.ntsecurity.nu/onmymind/2006/2006-09-02.htmlhttp://www.ntsecurity.nu/onmymind/2006/2006-09-02.htmlhttp://www.ntsecurity.nu/onmymind/2006/2006-09-02.htmlhttp://www.ntsecurity.nu/onmymind/2006/2006-09-02.htmlhttp://www.ntsecurity.nu/onmymind/2006/2006-09-02.htmlhttp://gmgsystemsinc.com/fau/http://www.agilerm.net/publications_4.htmlhttp://www.techpathways.com/ProDiscoverIR.htmhttp://www.gmgsystemsinc.com/knttools/http://support.microsoft.com/kb/244139http://support.microsoft.com/kb/244139http://www.gmgsystemsinc.com/knttools/http://www.techpathways.com/ProDiscoverIR.htmhttp://www.agilerm.net/publications_4.htmlhttp://gmgsystemsinc.com/fau/http://www.ntsecurity.nu/onmymind/2006/2006-09-02.htmlhttp://www.storm.net.nz/projects/16http://sourceforge.net/projects/memparserhttp://www.dfrws.org/
  • 8/9/2019 Live Memory Acquisition for Windows Operating Systems, Naja Davis

    24/24

    24

    11.Microsoft,Inc.,DebuggingToolsforWindowsOverview,http://www.microsoft.com/whdc/DevTools/Debugging/default.mspx. [AccessedMarch

    21,2008].

    12.J.

    Kornblum,

    Using

    every

    part

    of

    the

    buffalo

    in

    Windows

    memory

    analysis,

    Digital

    Investigation,vol.4,issue1,pp2429. March2007.

    13.H.Carvey,WindowsForensicAnalysis,Burlington,MA: SyngressPublishing,2007.14.AccessData,ForensicToolkit2.0,http://www.accessdata.com/Products/ftk2test.aspx.

    [AccessedMarch22,2008]

    15.VMWare,VMWareServer,http://www.vmware.com/products/server/. [AccessedApril8,2008]

    http://www.microsoft.com/whdc/DevTools/Debugging/default.mspxhttp://www.accessdata.com/Products/ftk2test.aspxhttp://www.vmware.com/products/server/http://www.vmware.com/products/server/http://www.accessdata.com/Products/ftk2test.aspxhttp://www.microsoft.com/whdc/DevTools/Debugging/default.mspx