ZARGARI, Shahrzad and DYSON, Jack (2022). Memory forensics: comparing the correctness of memory captures from locked Windows 10 machines using different boot capture vectors. Latin-American Journal of Computing, 9 (2), 37-51. [Article]
Documents
30406:605751
PDF
310-Article Text-1149-1-10-20220630.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
310-Article Text-1149-1-10-20220630.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (686kB) | Preview
Abstract
Memory forensics is rapidly becoming a critical part of all digital forensic investigations. The value of information stored within a computer memory is immense; failing to capture it could result in a substantial loss of evidence. However, it is becoming increasingly more common to find situations where standard memory acquisition tools do not work. The paper addresses how an investigator can capture the memory of a locked computer when authentication is not present. The proposed solution is to use a bootable memory acquisition tool, in this case, Passware Bootable Memory Imager. To enhance the findings, three different reboot methods will be tested to help identify what would happen if the recommended warm reboot is not possible. Using a warm reboot and a secure reboot, Passware Bootable Memory Imager was able to successfully acquire the memory of the locked machine, with the resulting captures being highly representative of the populated data. However, the memory samples collected after a cold reboot did not retain any populated data. These findings highlight that to capture the memory of a locked machine, the reboot method is highly successful, providing the correct method is followed.
More Information
Statistics
Downloads
Downloads per month over past year
Share
Actions (login required)
View Item |