Linux Memory Analysis
Revision as of 13:36, 7 April 2010 by Andrewtappert (https link uses bad cert, http works fine)
Linux Memory Analysis Tools
- The Forensic Analysis Toolkit (FATKit) is a cross-platform, modular, and extensible digital investigation framework for analyzing volatile system memory. (Availability/License: research project, not available)
- Draugr is a Linux memory forensics tool written in Python. (Availability/License: GNU GPL)
- Foriana is tool for extraction of information such as the process and modules lists from a RAM image using logical relations between OS structures. (Availability/License: GNU GPL)
- Second Look from Pikewerks Corporation - This product can perform analysis of live local and remote memory sources, as well as stored snapshots of memory (physical memory images or hibernate images). It can be used to detect rootkits and other kernel-hooking malware, as well as obtain forensic information about the state of the system. It has command-line and GUI interfaces, reverse engineering capabilities (including built-in disassembly and hexadecimal data views), and the capability of modifying target memory. An online reference kernel repository provides baselines for verification of thousands of distribution stock kernels. (Availability/License: commercial)
- The Volatility Framework is a collection of tools, implemented in Python, for the extraction of digital artifacts from volatile memory (RAM) samples. (Availability/License: GNU GPL)
Linux Memory Analysis Bibliography
- Linux Physical Memory Analysis, Paul Movall, Ward Nelson, Shaun Wetzstein; Usenix, 2005.
- An Analysis Of Linux RAM Forensics, J.M. Urrea, Masters Thesis, Naval Postgraduate School, 2006.
- Linux Live Memory Forensics, a presentation by Desnos Anthony describing the implementation of draugr, 2009.
- Forensic RAM Dump Image Analyzer by Ivor Kollar, describing the implementation of foriana, 2009.