Carnegie Mellon University
Browse

Computer Forensics: Results of Live Response Inquiry vs. Memory Image Analysis

Download (749.56 kB)
report
posted on 2008-08-01, 00:00 authored by Cal Waits, Joseph Ayo Akinyele, Richard A. Nolan, Larry Rogers
People responsible for computer security incident response and digital forensic examination need to continually update their skills, tools, and knowledge to keep pace with changing technology. No longer able to simply unplug a computer and evaluate it later, examiners must know how to capture an image of the running memory and perform volatile memory analysis using various tools, such as PsList, ListDLLs, Handle, Netstat, FPort, Userdump, Strings, and PSLoggedOn. This paper presents a live response scenario and compares various approaches and tools used to capture and analyze evidence from computer memory.

History

Date

2008-08-01

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC