Last Updated: 2013-12-12 17:12:30 UTC
by Basil Alawi S.Taher (Version: 1)
Memory has plenty of useful information for incident handlers such as open files, network connections and encryption keys. With pulling the plug forensics methodology you are losing all this information and you’re putting your skills into question if the case go to the court.
While analyzing memory require a set of skills, acquiring memory isn’t that difficult with the new tools available. On a previous diary[i] Mark Baggett wrote about using winpmem to acquire memory.
This diary will be about using similar tools which is Dumpit. Dumpit is a free tool written by Matthieu Suiche from MoonSols . Dumpit support both 64-bit and 32-bit Windows operating systems .
Dumpit can be downloaded from MoonSols website[ii] . After downloading and extracting the zip file it wil be a single executable file ‘dumpit.exe’.
One of the major benefits of Dumpit that it is very easy to use and any user with an admin privileges can use it. I would suggest that you provide your helpdesk team with some USB sticks with a copy of Dumpit, there are some issues that have to be considered: first the size of USB stick should be higher than the RAM size and if you have memory larger than 2 GB the USB sticks should be NTFS formatted.
When you have a suspicious event in a remote office or on a time that no body from the incident response team is available, a ready USB stick with Dumpit might be the ‘smoking gun’ for this incident.
The memory accusation can be performed with these three simple steps:
1. Insert the USB stick.
2. Double click on Dumpit icon (Figure 1)
3. Type “y” (figure 2)
Figure 1 (Dumpit executable)
Figure 2 (Dumpit)
After few minutes the image will be ready on the USB stick as the computer name-date-time.raw (figure 3)
Since Dumpit is a simple tool, it doesn’t have any analysis capabilities .Tools such as Mandiant Redline can be used for the analysis purpose.
If you have more information or corrections regarding our diary, please share.
|2013-12-12||Basil Alawi S.Taher||Acquiring Memory Images with Dumpit (0 Comments)|
|2013-12-11||Johannes Ullrich||Facebook Phishing and Malware via Tumblr Redirects (1 Comments)|
|2013-12-11||Johannes Ullrich||Browser Fingerprinting via SSL Client Hello Messages (0 Comments)|
|2013-12-10||Rob VandenBrink||Those Look Just Like Hashes! (8 Comments)|
|2013-12-10||Johannes Ullrich||Microsoft December Patch Tuesday (2 Comments)|
|2013-12-10||Rob VandenBrink||Adobe Updates today as well. (3 Comments)|
|2013-12-09||Rob VandenBrink||Scanning without Scanning (3 Comments)|
|2013-12-07||Guy Bruneau||Suspected Active Rovnix Botnet Controller (3 Comments)|
|2013-12-07||Guy Bruneau||Microsoft December Patch Pre-Announcement (0 Comments)|
|2013-12-06||Guy Bruneau||VMware ESX 4.x Security Advisory (0 Comments)|