Constable Clark: Mr.Sherlock!! We had a case for you, A Company had reported a data theft case where confidential data of the company is compromised. We already identified some of the suspects by analysing the companies logs. Chief of police wants you to look into the case.
Sherlock: Watson lets visit the company and create an image of RAM and let's analyse the data.
Software required to create the image of RAM: FTK Imager.
Step 1: Install, FTK Imager in victim computer.
Step 2: Open FTK Imager and Click on capture the memory.
Step 3: Browse the location for the location to save the dump file, then click capture memory.
Watson: Sherlock, All the files are backed up into the hard drive.
Sherlock: Lets, Analyze them in the Forensics workstation.
Workstation requirements:
Kail Linux , Volatility installed in it.
To install Volatility , sudo apt-get install volatility.
Sherlock: Watson lets recover the data and find the process performed.
Here the file name is Win7memdump.mem
Step 1: Open terminal in workstation
volatility -f filename
imageinfo
Step 2: Now at the place of operating
system enter the suggested profiles
volatility -f filename
--profile=operatingsystem pslist
Step 3: To get a detailed analysis of the data, enter the command
volatility -f filename –-profile=operatingsystem
hivelist
Step 4: By the analyses of suscepts system RAM we can come to a conclusion.
Watson: Sherlock, Look at this some opened the sever drives.
Sherlock: Send this message to the chief.
Outcome of the blog: In this blog, we learnt how to analyse and recover RAM by volatility.
To be Continued .....
Comments
Post a Comment