Difference between revisions of "Memory analysis"

From ForensicsWiki
Jump to: navigation, search
m
Line 8: Line 8:
  
 
Various types of encryption keys can be extracted during memory analysis.
 
Various types of encryption keys can be extracted during memory analysis.
You can use [[AESKeyFinder]] to extract 128-bit and 256-bit [[AES]] keys and [[RSAKeyFinder]] to extract all private and public [[RSA]] keys from a memory dump [http://citp.princeton.edu/memory/code/]. [http://jessekornblum.com/research/volatility-plugins/cryptoscan.py cryptoscan.py] (plugin for the Volatility memory analysis framework) scans a memory image for [[TrueCrypt]] passphrases.
+
You can use [[AESKeyFinder]] to extract 128-bit and 256-bit [[AES]] keys and [[RSAKeyFinder]] to extract all private and public [[RSA]] keys from a memory dump [http://citp.princeton.edu/memory/code/]. [http://jessekornblum.com/research/volatility-plugins/cryptoscan.py cryptoscan.py] ([[List of Volatility Plugins|plugin for the Volatility memory analysis framework]]) scans a memory image for [[TrueCrypt]] passphrases.
  
 
== See Also ==  
 
== See Also ==  

Revision as of 14:02, 15 January 2009

Memory Analysis is the science of using a memory image to determine information about running programs, the operating system, and the overall state of a computer. Because the analysis is highly dependent on the operating system, we have broken it into subpages:

Encryption Keys

Various types of encryption keys can be extracted during memory analysis. You can use AESKeyFinder to extract 128-bit and 256-bit AES keys and RSAKeyFinder to extract all private and public RSA keys from a memory dump [1]. cryptoscan.py (plugin for the Volatility memory analysis framework) scans a memory image for TrueCrypt passphrases.

See Also