4 hours 15 minutes
Hello and welcome back
in the last video, we were analyzing the data dumper DD on its functionality.
You know what? I know Those comes it for this video. So if you're free to post this one a go back to the previous one for analyzing what did he is
in this video we're going to analyze, have to obtain physical memory in a forensic manner.
Conservation of military data is one of the most challenging tasks in computer forensics. This is to dump the round content off running computer in a forensically sound manner.
In the Microsoft Windows environment, Billy provides a convenient way to cope with a memory into a file. There's only one flaw.
It won't work for Windows servers to those on three. Be back. One worse
the dumper. Or did he? For lice in Accord don't function, which create a special image structure in a key world equals value for months. Therefore, the auto file is readable in many tools and applications like the Windows Colonel, The bugger
we need to analyze the pros on comes off this process off foreign six ramp dumping with Dede
in the event as well. After there is no need to start so far. Like Kepner, more drivers on the system under examination
three on the created memory dump usually fit onto a USB memory stick.
A simple 54 months it's managed fine, Off said equals the address. In physical memory,
executing the program does not require reboot in the system or any disruption off the service
in these advantages. In addition to the fact that this can be done in a recent version of Windows, we also have that they don't memory has the same size after, UM,
the system continues to wrong there in the dump,
resulting in a blurred image instead, off a sharp snapshot.
Macaws off Colonel. The bugger can't handle the 54 months.
They're no publicly available tools to analyse a memory. Don't finally, administrator privileges are required.
Physical memory exception object which enable us to access the physical memory from your dinner user modes. Applications in windows for territory from a security viewpoint,
deception object can only be opened by members off the Minister group, as we have seen,
unfortunately also for our forensics. Viewpoints on these remote access to it has been blocked in those experiences to forbid on Windows to the sentry Windows Vista on followings.
We will be stolen it anyways as Humane Corner in the Forensic investigation. Some servers all my change where this process it's possible on. Also, it's good to know the full functionality off duty.
This in Texas plate, really Must you physical memory on Save It to a file for further analysis.
This ***, the system memory until the end off. I never result. You'll see heaven I never reporting. When the starting off set off the reed goes beyond the ranch off the addressable physical memory
any windows waste the working toe can analyze a physical memory much after conversion to a Microsoft custom format.
Today we use commercial tools such as the Forensic Tool Kit or a Stick eight or a program called Don't Beat from Going Suze. We were molested. Stools layer on this course
as useful. Here's a quick question for you
when performer off basic rat jumping with the D. Which statement from the following is not true?
Do you think it's a dump? Memory has the same size as the ram off. Be a Mr British are required.
We'll see Executing The program does not require within the system
or D, it will work on a Windows feast. Our operating system.
The answer here is the Unfortunately, I'll use remote access to the physical memory has been blocked in windows expiate 64 bit on windows to those country. Serbia Serbia Popcorn on Windows Vista on following
foreign. Six. Analysis. Off physical memory
is a relatively new field off research, though their local software tools for acquisition of systems physical memory We need to be careful as so for tools were inevitable damage or even override the contents of physical memory.
A lot of information and computer, such as the system processes that were information. Logan Information released. Information. Open fires Configuration parameters on song must be accessed by containing on analyzing the target computers. Physical memory dump.
This will be the main topic in the next Morty.
In this model, we have covered that dara dumper, or didi, as a tool for creating foreign sticky much files. We studied the definition, some examples, the functionality and the syntax. We also analyzed the physical memory. How can we get information off it?
Don't forget to shake the references supplementary material where you will have the chance to practice that Opec's covered
and you mean the next video where we will be reeling from labs
Certified Information Security Manager (CISM)
A CISM certification shows you have an all-around technical competence and an understanding of the ...
13 CEU/CPE Hours Available
Certificate of Completion Offered
Identifying Web Attacks Through Logs
Log analysis involves reviewing and evaluating system activities to help mitigate risks. If you’re training ...
3 CEU/CPE Hours Available
Certificate of Completion Offered