Quantcast
Channel: ForensicZone
Browsing latest articles
Browse All 27 View Live

User Assist Data in the RAM Dump

Lately some good information has been posted on the web regarding the importance of the USER ASSIST. Especially by Didier Stevens (http://blog.didierstevens.com/programs/userassist/) and Harlan Carvey...

View Article



"Guillotine Method" for RAM Acquisition.

Scenario#1 You come up to a desktop computer that you have legal authority to forensically analyze. The computer is powered up but sitting at the Windows Login Screen. No chance to get an image of the...

View Article

Guillotine Steps and Conditions

Conditions: • Machine is On but Not Logged In. • Machine is On / Logged On / Not Running Encryption. (Bitlocker, Best Crypt…). (If running encryption make logical image immediately.) • You Have...

View Article

RAM Capture Methodology

View Article

Speaking Engagement

I am presenting a two-day course on RAM Acquisition and RAM Analysis at the International Association of Computer Investigative Specialists (IACIS) 2008 CFCE Course between April 28, 2008 through May...

View Article


XPSP3 - How this is going to affect RAM Analysis?

Well to sum up XPSP3 (for RAM Analysis) I’d say the prognosis is great. The key offsets that I look for in the EPROCESS (Page Directory Base, Create Time Low, Create Time High, Exit Time Low, Exit Time...

View Article

“Lest We Remember: Cold Boot Attacks on Encryption Keys"

Seems like a team of Princeton students have put together a very well done website, research paper (pdf) and video regarding acquiring RAM. The jist of these items shows: Information stays in RAM after...

View Article

Fifteen Minute Malaware Analysis

Tools:1. VMWARE Workstation or VMWARE Server (Sever=free)2. Windows 2000 (Small$)3. TextScan - Free (by AnalogX)http://www.analogx.com/contents/download/program/textscan.htm4. PtfinderFE - Free...

View Article


Practical of “15 Minute Virus Analysis”

I want to show a practical of my “15 Minute Virus Analysis” You must download the RADA Virus if you want to “play” along. The RADA Virus is a REAL VIRUS SO BE CAREFUL… The RADA VIRUS was created...

View Article


RAM Enscript Version 1.0

RAM ENSCRIPT UPDATED!!! DownloadThe new RAM Enscript contains:OS IdentificationProcesses (Exited / Running)Registry Remnants (UserAssist)MSHTML Remnants MFT Parser. Runs against RAM Dumps from Windows...

View Article

BIOS Magic Numbers in RAM (Beta)

A colleague of mine approached me after teaching a class on finding information in RAM. He asked me to prove a particular RAM acquisition came form a particular machine. My first thought was to run to...

View Article

Article 11

I am presenting a two-day course on RAM Acquisition and RAM Analysis at Digital Intelligence. The course is June 10-12, 2008 and is FREE. The following is a quick synopsis of the training:RAM Analysis...

View Article

Winen.exe - RAM Imaging Tool Included in New Version of Encase

Today when I downloaded the latest version of Encase (6.11.0.43) I discovered winen.exe in the Encase Program Folder. Apparently winen.exe is the new RAM Acquisition Tool Provided by Guidance....

View Article


Article 9

Using Volatility (1.3_Beta), Volatility Plugin from Moyix, a test RAM Image (xp-laptop-2005-06-25.img) and a Windows Hash/Password Finder (SamInside or Cain and Abel) identify the passwords for the...

View Article

VMWare Running? Better Check for Different Windows Operating System's...

Identify Multiple Windows OS Versions in a Single RAM Capture if the Host Machine is Running VMWare Machines.I often run VMWare Machines, on my host machine,so I can easily grab the machine's RAM...

View Article


Sandman Shell: Batch files to Define environment variable _NT_SYMBOL_PATH

I had the following a question from Mr Anonymous about Matthieu Suiche's Sandman Shell Project:“...the same happens with hibrshell. When I execute the command it crashes while "Retrieving Kernel Image...

View Article

Volatility Batch File Maker

The Tool: VolatilityBatch File Maker DownloadI wanted to take the text output of the various tools (Ptfinder, PtFinderFE and Volatility >PsScan2) which identifies all the offsets for (running)...

View Article


Walk-Through: Volatility Batch File Maker and Volatility's ProcDump

1. Download the following files from Hogfly (Website)exemplar6.tar.gz.001exemplar6.tar.gz.002exemplar6.tar.gz.003In my example I placed the files in e:\exemlar6\ directory2. Add the downloaded files...

View Article

Walk-Through: Volatility Batch File Maker and Volatility's VadDump

*********** The First 5 Steps are exactly the same as my last posted regarding Walk-Through: Volatility Batch File Maker and Volatility's ProcDump. The Walk-through Portion is repeated here for future...

View Article

The Mystery of ROT (-29)

I know if your reading my blog you've seen ROT13 and know it is used by Microsoft in the UserAssist Registry Key.But now I’ve found Microsoft using ROT(-29) or Rotate Minus 29 which is considerably...

View Article

New Win7 Process Enscript (Beta)

I updated my Basic Memory Analysis Enscripts (Version 6) and rolled them out at the 2010 WACCI Conference. The newest addition is an Enscript to carve for Windows 7 Processes (Exited and...

View Article


EnScripts (EnPacks) to Carve iPhone SMS Messages

These are tools to find SMS Messages from physical (carve) or logical files, recovered from an iPhone (DOWNLOAD). This tool is really meant to find unallocated SMS Messages in a Raw disk recovery of...

View Article


WACCI Conference 2012 - Tip and Tricks Notes

Wisconsin Association Computer Crimes Investigator Conference 2012 Tip and Tricks Notes:  "Thank you" for all the great input. Digital Intelligence Forensic Scanner RegRipper CERT Tools (Registration...

View Article

Wisconsin Association of Computer Crime Investigators 2013 Conference

"Sup" (...been a long while) PTFinderFE is obsolete do to the new innovations in Volatility. (Updated 10/20/13)My New Volatility Batch File Maker does all that PTFinderFE did and MORE!!! *****Known...

View Article

KAI OS Forensics for Money and Profit

The last month I have been forensically analyzing the KAI OS 2.5, formally FireFox OS.  We are seeing a bunch of these feature phones in our lab. Download KAI OS Forensics for Money and Profit Download...

View Article

Browsing latest articles
Browse All 27 View Live




Latest Images