Acquiring RAM From A Live System
In the not so far past, it was common practice when encountering a system that needed to be acquired or has been compromised to disconnect the power from the system in order to save the "state" of the system to be forensically analyzed later. We have since learned that valuable data is lost when the system is powered off and all attempts to collect this volatile data should be capture before the system is powered off. This may include but not limited to the following:
- current network connections
- running processes
- current mapped drives or shares
- Users currently logon
- system memory
Acquiring the memory from a system is a relatively new item to acquire when it comes to collecting volatile data. It wasn't until the recent years that we learn how to analyze this data in order to extract the valuable data contain within the memory.
Some of this valuable data that can be found in the memory consist of the following:
- Current process and DLLs
- Network connections
- Unencrypted password
- Registry entries
There are many tools available that you can use to acquire the live memory from a system. Below is a list of some of the popular free tools:
Tool | OS | Comments |
FTK Imager | Windows |
|
HBGary FastDump | Windows |
|
MoonSols DumpIt | Windows |
|
Mandiant Memoryze | Windows | Officially Supports:
|
dd | *nix |
|
Mac Memory Reader | Mac |
|
Once you acquire the system memory, then comes the task of extracting the data from the image. Below are three tools that can be used to extract this data and over the next couple of blog postings, I will use each tool on the same memory samples to evaluate the ease of use of each program along with their differences. I will utilize and evaluate each program as a person that has not had any formal training on using each tool or malware analysis but can deploy common troubleshooting skills to identify the threats contained within each memory sample. All samples used for this evaluation will be acquired from the publicly available sample found on the Google Code - Volatility page.
http://code.google.com/p/volatility/wiki/MemorySamples
The three applications used for memory analysis are:
- Volatility
- Mandiant Redline
- HBGray Responder (community edition)
A parent class can send a message to its child, but the child cannot.
ReplyDeletedissertations
The information about HBGary's FastDump is somewhat misleading. There is a version of FastDump (called FastDump Pro) which supports 64bit systems running 4+ Gigabytes of RAM.
ReplyDelete