Windows memory forensics

Nicolas Ruff1
1EADS-IW SE/CS, Suresnes, France

Tóm tắt

Từ khóa


Tài liệu tham khảo

Immunity [CANVAS] http://www.immunitysec.com/products-canvas.shtml

Core [IMPACT] http://www.coresecurity.com/products/coreimpact/index.php

[Syscall Proxying] http://www.coresecurity.com/files/files/11/SyscallProxying.pdf

Metasploit’s [Meterpreter] http://www.metasploit.com/projects/Framework/docs/meterpreter.pdf

Ultimate way to hide [rootkit] https://www.rootkit.com/newsread.php?newsid=648

Fred [Raynal] “Malicious cryptography” Part one: http://www.securityfocus.com/infocus/1865 Part two: http://www.securityfocus.com/infocus/1866

Éric [Filiol] “Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis: the Bradley virus” Proceedings of the 14th EICAR Conference, 2005 http://papers.weburb.dk/archive/00000136/01/eicar05final.pdf

[Malicious Cryptography] http://www.cryptovirology.com/

Andreas [Schuster] http://computer.forensikblog.de/en/

Windows Incident Response http://windowsir.blogspot.com/

Mariusz Burdach http://forensic.seccure.net/

George M. [Garner] http://users.erols.com/gmgarner/forensics/

[Dump Analysis] http://www.dumpanalysis.org/

Alexandre Garaud http://c4rtman.blogspot.com/

[Pentium] Intel® 64 and IA-32 Architectures Software Developer’s Manuals http://www.intel.com/products/processor/manuals/index.htm

[Debugging Tools] for Windows http://www.microsoft.com/whdc/devtools/debugging/default.mspx

\Device\[PhysicalMemory] http://technet2.microsoft.com/WindowsServer/en/library/e0f862a3-cf16-4a48-bea5-f2004d12ce351033.mspx?mfr=true

[DMP] File Structure http://computer.forensikblog.de/en/2006/03/dmp_file_structure.html

[CrashOnCtrlScroll] Windows feature lets you generate a memory dump file by using the keyboard http://support.microsoft.com/kb/244139

[Q254649] Overview of memory dump file options for Windows Server 2003, Windows XP, and Windows 2000 http://support.microsoft.com/kb/254649

[Q237740] How to overcome the 4,095 MB paging file size limit in Windows http://support.microsoft.com/kb/237740

[Q886429] What to consider when you configure a new location for memory dump files in Windows Server 2003 http://support.microsoft.com/kb/886429

[IOMMU] http://en.wikipedia.org/wiki/IOMMU

Virtualization Services [Market] to Reach $11.7 Billion by 2011, According to IDC http://www.idc.com/getdoc.jsp?containerId=prUS20778407

[SMSS] Session Manager SubSystem http://en.wikipedia.org/wiki/Session_Manager_Subsystem Mark E. Russinovich and David A. Solomon

[Windows Internals], 4th edn. http://www.microsoft.com/mspress/books/6710.aspx

[Upper Memory Area] Memory dumping over FireWire—UMA issues http://ntsecurity.nu/onmymind/2006/2006-09-02.html

[DFRWS] 2005 Challenge http://www.dfrws.org/2005/challenge/index.html

[Securitech] 2005, Challenge 16 http://www.challenge-securitech.com/archives/2005/displaylevel.php?level=21

Remote [Library Injection] http://www.nologin.org/Downloads/Papers/remote-library-injection.pdf

[Tribble] “A Hardware-Based Memory Acquisition Procedure for Digital Investigations” http://www.digital-evidence.org/papers/tribble-preprint.pdf

[iPod] “Firewire—all your memory are belong to us” http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf

Joanna [Rutkowska] “Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case)” http://invisiblethings.org/papers/cheating-hardware-memory-acquisition-updated.ppt

David [Piegdon] and Lexi [Pimenidis] “Targeting Physically Addressable Memory” http://david.piegdon.de/papers/SEAT1394-svn-r432-paper.pdf

[Adam Boileau] “Hit by a Bus: Physical Access Attacks with Firewire” http://www.security-assessment.com/files/presentations/ab_firewire_rux2k6-final.pdf

Joanna Rutkowska [Subverting Vista Kernel] http://invisiblethings.org/papers/joanna%20rutkowska%20-%20subverting%20vista%20kernel.ppt

Loïc Duflot [SMM] Security Issues Related to Pentium System Management Mode http://cansecwest.com/slides06/csw06-duflot.ppt

Sherri Sparks, Jamie Butler [Shadow Walker]: Raising the Bar for Rootkit Detection http://www.blackhat.com/presentations/bh-jp-05/bh-jp-05-sparks-butler.pdf

Bradley Schatz [BodySnatcher]: Towards reliable volatile memory acquisition by software https://www.dfrws.org/2007/proceedings/p126-schatz.pdf

Andreas Schuster [DFRWS 2006] Searching for processes and threads in Microsoft Windows memory dumps http://dfrws.org/2006/proceedings/2-Schuster.pdf

[Komoku] http://www.komoku.com/

[PicoComputing] http://www.picocomputing.com/

[Lexfo] http://www.lexfo.fr/

[LiveKD] http://www.microsoft.com/technet/sysinternals/SystemInformation/LiveKd.mspx

[PTFinder] 0.3.0 http://computer.forensikblog.de/en/2006/09/ptfinder_0_3_00.html

[Volatools] http://www.komoku.com/forensics/basic.html

[SystemDump] http://citrite.org/blogs/dmitryv/2006/09/12/new-systemdump-tool/

[FATKit] http://www.4tphi.net/fatkit/

[MemParser] http://sourceforge.net/projects/memparser

[pmodump.pl] and the Truman Project http://www.secureworks.com/research/tools/truman.html

Guidance Software: [EnCase] Forensics http://www.guidancesoftware.com/products/ef_index.asp

The [Sleuth Kit] & Autopsy: Digital Investigation Tools for Linux and other Unixes http://www.sleuthkit.org/

[Disk Explorer] http://www.runtime.org/

[Forensic Toolkit] http://www.accessdata.com/catalog/partdetail.aspx?partno=11000

[X-Ways Forensics] http://www.x-ways.net/forensics/index-m.html

[iLook] http://www.ilook-forensics.org/

[WOLF] http://blogs.technet.com/robert_hensing/archive/2005/01/17/354471.aspx

[KnTTools] http://users.erols.com/gmgarner/KnTTools/

[VMWare] http://www.vmware.com/

Microsoft [Virtual PC] http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx