May 2011, The Computer Enterprise and Investigations Conference 2011
This session's objective is to learn methods of RAM image acquisition and analysis using EnCase. Previously, EnCase couldn't analyze volatile information such as running processes and TCP connections included in physical memory images. However, my EnScripts, "Memory Forensic Toolkit" and "Microsoft CrashDump Analyzer", enable EnCase to do that. Attendees use the EnScripts in this session.
The speaker explains the architecture of memory management and two analyzing methods of RAM images to assist attendees in hands-on analysis. Based on the knowledge, attendees can get hands-on experience like extracting hidden processes/kernel drivers/TCP connections, dumping code-injected memory regions, searching web mail content and comparing entropy values of polymorphic malwares inside RAM images using the EnScripts. Attendees can also understand pros and cons of two EnScripts.