CyberSecurity File
CyberSecurity File
ETCT 404
To nurture young minds in a learning environment of high academic value and imbibe
spiritual and ethical values with technological and management competence.
MISSION
The Institute shall endeavor to incorporate the following basic missions in the
teaching methodology:
Diversification
The Engineering, Technology and Management disciplines have diverse fields of studies
with different attributes. The aim is to create a synergy of the above attributes by
encouraging analytical thinking.
Entrepreneurship
The Institute strives to develop potential Engineers and Managers by enhancing their skills
and research capabilities so that they become successful entrepreneurs and responsible
citizens.
INDEX
NAME OF RUBRICS
S.NO DATE SIGN
EXPERIEMENT R1 R2 R3 R4 R5
Implementation to gather
information from any PC’s
connected to the LAN using whois,
1. port scanners, network scanning,
Angry IP scanners etc.
Implementation of Steganography.
3.
Implementation of MITM-attack
4. using wireshark/ network sniffers
Implementation of IT Audit,
malware analysis and Vulnerability
6. assessment and generate the report.
AIM:- Implementation to gather information from any PC’s connected to the LAN using
whois, port scanners, network scanning, Angry IP scanners etc.
THEORY:-
l) IP scanner- whois:
Whois is a widely used Internet record listing that identifies who owns a domain and how to
get in contact with them. Here for example we have searched for domain name
https://www.mait.ac.in/ It displays domain information like the register date, update date,
registrar provider etc.
2) Port scanners
Port scanning is the process of scanning a network or computer system for open ports and
identifying the services or applications that are running on those ports. It is often used by
network administrators, security analysts, and hackers to assess the security of a network
or system.
Step2: Select the scan type: Choose the type of scan we want to perform based on wer
objective. The most common types are TCP connect scans, SYN scans, and UDP scans.
Step3: Determine the port range: Decide which ports we want to scan. We can scan all
ports, a specific range of ports, or a specific set of ports.
Step4: Launch the scan: Use a port scanning tool or script to launch the scan. The tool
will send packets to each port in the specified range and analyze the responses.
Step5: Analyze the results: Review the results of the scan to identify open ports and the
services or applications running on those ports.
For domains with II'ITPS enabled, we have to specify the -SSI flag to scan p: Here scanned
Wikipedia.org
VIVA VOICE QUESTION
Question 1: What is port scanning and why it is essential technique in network security
assessments?
Answer : Port scanning is the process of probing a computer system or network to discover
open ports and services available on those ports. It involves sending a series of messages to
each port on a target system to determine whether the port is open, closed, or filtered by a
firewall. Port scanning can also reveal the type of service running on each open port, as well
as the version of the service.
Port scanning is crucial in network security assessments because it serves as a foundational
technique for understanding the network's structure and vulnerabilities. By probing for open
ports and services, port scanning reveals potential entry points for attackers. This information
enables security professionals to assess the network's security posture, identify weaknesses,
and implement appropriate countermeasures. Additionally, port scanning assists in network
mapping, service enumeration, firewall assessment, and intrusion detection, making it an
indispensable tool for safeguarding against cyber threats.
Question 2: How does Angry IP Scanner differ from traditional port scanners?
Answer: Angry IP Scanner differs from traditional port scanners in that it provides a
comprehensive view of the network topology by identifying active hosts within the LAN.
Unlike traditional port scanners, which focus on probing individual hosts for open ports,
Angry IP Scanner scans a range of IP addresses and quickly identifies active hosts, making it
a valuable tool for network reconnaissance.
Symmetric Cryptography
In this type, the encryption and decryption process uses the same key. It is also called is secret
key cryptography. The main features of symmetric cryptography are as follows −
Drawback
The major drawback of symmetric cryptography is that if the key is leaked to the intruder, the
message can be easily changed and this is considered as a risk factor.
The most popular symmetric key algorithm is Data Encryption Standard (DES) and Python
includes a package which includes the logic behind DES algorithm.
CODE: –
import pyDes
OUTPUT:
Asymmetric Cryptography
It is also called as public key cryptography. It works in the reverse way of symmetric
cryptography. This implies that it requires two keys: one for encryption and other for
decryption. The public key is used for encrypting and the private key is used for decrypting.
Drawback
CODE:-
from Crypto import Random
from Crypto.PublicKey import RSA
import base64
def generate_keys():
# key length must be a multiple of 256 and >= 1024
modulus_length = 256*4
privatekey = RSA.generate(modulus_length, Random.new().read)
publickey = privatekey.publickey()
return privatekey, publickey
OUTPUT:-
VIVA VOICE QUESTION
CODE:-
from PIL import Image
def genData(data):
newd = []
for i in data:
newd.append(format(ord(i), '08b'))
return newd
def modPix(pix, data):
datalist = genData(data)
lendata = len(datalist)
imdata = iter(pix)
for i in range(lendata):
pix = [value for value in imdata.__next__()[:3] +
imdata.__next__()[:3] +
imdata.__next__()[:3]]
for j in range(0, 8):
if (datalist[i][j] == '0' and pix[j]% 2 != 0):
pix[j] -= 1
elif (datalist[i][j] == '1' and pix[j] % 2 == 0):
if(pix[j] != 0):
pix[j] -= 1
else:
pix[j] += 1
if (i == lendata - 1):
if (pix[-1] % 2 == 0):
if(pix[-1] != 0):
pix[-1] -= 1
else:
pix[-1] += 1
else:
if (pix[-1] % 2 != 0):
pix[-1] -= 1
pix = tuple(pix)
yield pix[0:3]
yield pix[3:6]
yield pix[6:9]
def enCODE:_enc(newimg, data):
w = newimg.size[0]
(x, y) = (0, 0)
for pixel in modPix(newimg.getdata(), data):
newimg.putpixel((x, y), pixel)
if (x == w - 1):
x = 0
y += 1
else:
x += 1
def enCODE:():
img = input("Enter image name(with extension) : ")
image = Image.open(img, 'r')
data = input("Enter data to be enCODE:d : ")
if (len(data) == 0):
raise ValueError('Data is empty')
newimg = image.copy()
enCODE:_enc(newimg, data)
new_img_name = input("Enter the name of new image(with
extension) : ")
newimg.save(new_img_name,
str(new_img_name.split(".")[1].upper()))
def deCODE:():
img = input("Enter image name(with extension) : ")
image = Image.open(img, 'r')
data = ''
imgdata = iter(image.getdata())
while (True):
pixels = [value for value in imgdata.__next__()[:3] +
imgdata.__next__()[:3] +
imgdata.__next__()[:3]]
binstr = ''
for i in pixels[:8]:
if (i % 2 == 0):
binstr += '0'
else:
binstr += '1'
data += chr(int(binstr, 2))
if (pixels[-1] % 2 != 0):
return data
def main():
a = int(input(":: Welcome to Steganography ::\n"
"1. EnCODE:\n2. DeCODE:\n"))
if (a == 1):
enCODE:()
elif (a == 2):
print("DeCODE:d Word : " + deCODE:())
else:
raise Exception("Enter correct input")
if __name__ == '__main__' :
main()
OUTPUT:-
VIVA VOICE QUESTION
Wireshark or Ettercap
We’ll need a client machine as well whose network traffic we will spoof and sniff to get
cleartext submission of passwords from certain vulnerable websites.
The IP address of the client machine used over LAN for this demo is: 192.168.1.44
• Open terminal and ping the target machine to verify the IP address we are using and
to add it to wer arp table
• Type arp in the terminal command line to see wer arp table
• For security purposes, IP forwarding is by default disabled in modern Linux systems.
For temporarily enabling it, type : echo 1 > /proc/sys/net/ipv4/ip_forward
• For ARP poisoning, the command syntax is: arpspoof -i interface -t target -r host
• Example: arpspoof -i eth0 -t 192.168.1.44 -r 192.168.1.1
A basic setup is complete and victim network traffic will now pass through the attacker
machine. To listen to these packets, we will use Wireshark
• Open up a new terminal and type wireshark. Go to the interface which is capturing all
the data flow (here eth0) and start the capture.
• Filter out packets according to what we are looking for. For the purpose of this demo,
the user is logging in to a vulnerable website DVWA which uses HTTP instead of the
secure version HTTPS. Filter protocol as http and search for required data.
• Right click on the packet and follow TCP stream to open up the data contained within.
We can clearly obtain the login credentials of the user, that is the username and
password.
VIVA VOICE QUESTION
Question 2: What are some common methods used to execute a MITM attack?
Answer: Common methods used to execute a MITM attack include ARP spoofing, DNS
spoofing, HTTPS spoofing, and session hijacking.
THEORY:-
in the Start menu or by right-clicking on the Windows Defender Security Center icon
4. In the Windows Firewall with Advanced Security window, we will see three profiles:
Domain, Private, and Public. These profiles correspond to different types of network
connections.
5. Select the profile we want to configure and click on "Inbound Rules" in the left pane.
7. Select the type of rule we want to create. For example, if we want to block a specific
8. Follow the prompts to complete the rule creation process. We will need to specify the
9. Repeat the process for any other inbound rules we want to create.
12. Follow the prompts to create outbound rules to allow or block specific types of traffic.
13. Repeat the process for any other outbound rules we want to create.
VIVA VOICE QUESTION
Question 4: Apart from the built-in Windows Firewall, what additional security
measures can be implemented for Windows security?
Answer: In addition to the Windows Firewall, additional security measures for Windows
security include installing antivirus software, enabling Windows Defender Antivirus, keeping
the operating system and software up-to-date with patches and updates, using strong
passwords, and enabling BitLocker drive encryption for data protection.
EXPERIMENT-6
THEORY:-
1) IT Audit
An IT audit is the process of examining the information technology systems, infrastructure,
policies, and procedures in a company. It maintains the effectiveness, security, and compliance
of an IT environment while ensuring that all employees are following the established security
protocols and standards.
Why is IT audit important?
Since so many organizations are spending large amounts of money on information
technology, they need to ensure that these IT systems are reliable, secure, and not vulnerable
to cyber-attacks.
An IT audit is crucial to any business because it maintains the integrity and reliability of an
organization's information technology infrastructure and data. It overlooks functions like risk
assessment, data integrity, compliance, security assessment, and aid to business
continuity and disaster recovery.
IT audit is also cost-effective in the sense that it will reveal exactly which services we need and
which ones wer company can do without. Plus, since the technology we use is evolving so fast,
an IT audit can let we know which of wer systems and tools are outdated.
An IT audit helps organizations to:
Identify and mitigate IT risks: IT audits help organizations identify and manage risks like
cyberattacks, data breaches, and system failures. IT auditors recommend ways to mitigate such
risks by implementing security controls and developing business continuity plans.
Ensure compliance with laws and regulations: Most industries are subject to laws and
regulations that govern their IT systems and data management. With IT audits, organizations
stay compliant with such requirements and prevent any legal actions.
Improve the efficiency of IT operations: IT audits help identify areas where IT operations
can be improved through workflow automation. This results in cost savings and improvement
in overall business performance.
Protect corporate assets: Organizations can protect their IT assets from unauthorized access,
use, and destruction by using IT audits to identify the vulnerabilities they are exposed to.
Ensure the integrity of data: IT audits also ensure that the organizational database is
accurate, updated, and reliable. This helps support business decisions and also with regulation
compliance.
Align IT with business goals and objectives: IT audits align IT systems and practices with
business objectives. This accelerates the process for organizations to achieve their strategic
goals.
Look out for shadow IT: Shadow IT creates gaps in security and presents risks to wer
company’s sensitive data, especially since it involves the use of apps that are not being
monitored by security and IT departments. IT audit can identify these risks and mitigate them
effectively.
IT audit objectives
Since operations at modern companies are increasingly computerized, IT audits are used to
ensure that information-related controls and processes are working properly. The primary
objectives of an IT audit include the following:
• Evaluating the systems and processes currently in place that work to secure company
data.
• Determining if there are potential risks to the company’s information assets and finding
ways to minimize those risks.
IT Audit Process
The IT audit process usually consists of four stages: planning, fieldwork, audit report, and
follow-up. The process follows the plan-do-check-act (PDCA) approach and may vary
depending on the organizational needs and audit functions.
• Planning: To kick start the process, the IT auditor will define the scope, objectives,
and methodology of the audit. This involves gathering information about the
organization’s IT environment (existing systems, applications, data, policies, and
processes) and identifying any risks and controls related to them. Once identified, they
will develop and finalize an audit plan.
• Fieldwork: Once the plan is in place, the IT auditor executes it and tests the
effectiveness of the organization's IT controls. At this stage, they will also collect and
analyze evidence that supports their findings. The auditor will document their work and
communicate the discovered issues and recommendations to the stakeholders.
• Audit report: After finishing the fieldwork, the IT auditor prepares a formal report that
will summarize the audit findings and recommendations. The report will also comprise
ratings and opinions for the identified IT audit area. This report is then presented to the
stakeholders.
Malware Analysis
Malware analysis is a process of studying a malicious sample. During the study, a researcher's
goal is to understand a malicious program's type, functions, code, and potential dangers.
Receive the information organization needs to respond to the intrusion.
We can customize a VM with specific requirements like a browser, Microsoft Office, choose
OS bitness, and locale. Add tools for the analysis and install them in wer VM: FakeNet, MITM
proxy, Tor, VPN. But we can do it easily in ANY.RUN sandbox.
Step 2. Review static properties
This is a stage for static malware analysis. Examine the executable file without running it:
check the strings to understand malware's functionality. Hashes, strings, and headers' content
will provide an overview of malware intentions.
For example, in the screenshot below, we can see the hashes, PE Header, mime type, and other
information of the Formbook sample. To take a brief idea about functionality, we can take a
look at the Import section in a sample for malware analysis, where all imported DLLs are listed.
Here is the dynamic approach to malware analysis. Upload a malware sample in a safe virtual
environment. Interact with malware directly to make the program act and observe its execution.
Check the network traffic, file modifications, and registry changes. And any other suspicious
events. In our online sandbox sample, we may take a look inside the network stream to receive
the crook's credentials info to C2 and information that was stolen from an infected machine.
If threat actors obfuscated or packed the code use deobfuscation techniques and reverse
engineering to reveal the code Identify capabilities that weren't exposed during previous steps.
Even just looking for a function used by malware, we may say a lot about its functionality. For
example, function "InternetOpenUrlA" states that this malware will make a connection with
some external server.
Additional tools, like debuggers and disassemblers, are required at this stage.
Include all wer findings and data that we found out. Provide the following information:
• Summary of wer research with the malicious program's name, origin, and key
features.
• General information about malware type, file's name, size, hashes, and antivirus
detection capacities.
• Description of malicious behavior, the algorithm of infection, spreading
techniques, data collection, and ways of С2 communication.
• Necessary OS bitness, software, executables and initialization files, DLLs, IP
addresses, and scripts.
• Review of the behavior activities like where it steals credentials from, if it
modifies, drops, or installs files, reads values, and checks the language.
• Results of code analysis, headers data.
• Screenshots, logs, string lines, excerpts, etc.
Vulnerability assessment
First, we need to decide what we want to scan, which isn’t always as simple as it sounds. One
of the most common cyber security challenges facing organizations is a lack of visibility into
their digital infrastructure and its connected devices. Some reasons for this include:
• Mobile Devices: Smartphones, laptops, and similar devices are designed to disconnect
and reconnect frequently from the office, as well as employee’s homes and often other
remote locations.
• IoT Devices: IoT devices are part of the corporate infrastructure but may be connected
primarily to mobile networks.
We’d all love to work in an organization that was perfectly organized, but the reality is often
messier. It can be hard simply to keep track of what different teams are putting online, or
changing, at any given point. This lack of visibility is problematic because it’s difficult to
secure what we can’t see. Luckily, the discovery aspect of this process can be largely
automated. For example, some modern vulnerability assessment tools can perform discovery
on public-facing systems and connect directly to cloud providers to identify cloud-based
infrastructure. Learn more about asset discovery tools or try our interactive demo below to see
it in action.
2. Prioritization
Once we know what we’ve got, the next question is whether we can afford to run a vulnerability
assessment on all of it. In a perfect world, we would be running a vulnerability assessment
regularly on all of wer systems. However, vendors often charge per-asset, so prioritization can
help where budgets can’t cover every asset the company owns.
• Internet-facing servers
• Customer-facing applications
• Databases containing sensitive information
It’s worth noting that the two of the most common vectors for untargeted or mass attacks are:
So if we can’t afford anything else, at least try to get these covered, in the same order.
3. Vulnerability scanning
Vulnerability scanners are designed to identify known security weaknesses and provide
guidance on how to fix them. Because these vulnerabilities are commonly publicly reported,
there is a lot of information available about vulnerable software. Vulnerability scanners use
this information to identify vulnerable devices and software in an organization’s infrastructure.
The scanner initially sends probes to systems to identify:
Based on this information, the scanner can often identify many known vulnerabilities in the
system being tested.
In addition, the scanner sends specific probes to identify individual vulnerabilities which can
only be tested by sending a safe exploit that proves the weakness is present. These types of
probes may identify common vulnerabilities such as ‘Command Injection’ or ‘cross-site
scripting (XSS)’, or the use of default usernames and passwords for a system.
Depending on the infrastructure that we’re scanning (and particularly how expansive any
websites are), the vulnerability scan may take anywhere from a few minutes to a few hours.
After the vulnerability scan is complete, the scanner provides an assessment report. When
reading and developing remediation plans based on this report, we should consider the
following:
• Severity: A vulnerability scanner should label a potential vulnerability based upon its
severity. When planning for remediation, focus on the most severe vulnerabilities first,
but avoid ignoring the rest forever. It’s not uncommon for hackers to chain several mild
vulnerabilities to create an exploit. A good vulnerability scanner will suggest timelines
for when to fix each issue.
In most cases, there is a publicly released patch to correct a detected vulnerability, but it can
often require a configuration change or other workaround too. After applying a fix, it’s also a
good idea to rescan the system to ensure the fix was applied correctly. If it isn’t, the system
may still be vulnerable to exploitation. Also, if the patch introduces any new security issues,
such as security misconfigurations (although rare), this scan may uncover them and allow them
to be corrected as well.
Question 3: What tools and techniques are commonly used for vulnerability
assessment?
Answer: Common tools and techniques for vulnerability assessment include vulnerability
scanners (e.g., Nessus, OpenVAS), penetration testing frameworks (e.g., Metasploit),
network sniffers (e.g., Wireshark), and manual inspection of system configurations and logs.
Question 4: What are the different types of malware and their characteristics?
Answer: Common types of malware include viruses, worms, Trojans, ransomware, spyware,
and adware. Each type of malware has unique characteristics and propagation methods, but
they all pose threats to the confidentiality, integrity, and availability of data and systems.
AIM:- Implementation of Cyber Forensics tools for Disk Imaging, Data acquisition, Data
extraction and Data Analysis and recovery
THEORY:-
In this
window, data can be entered in different ways. One way is to enter the data manually. Type of
data to be entered in each field is selfexplanatory. The Time of Seizure and Date of Seizure
values are read from the system. Validation check on the data entered is performed when the
Next button is pressed.
Step 3-
• In the Following Figure Options menu provides two functionalities VIZ Export and
Import functions.
• The Export function allows the user to save the validated user entries entered into the
data collection window.
Step 4-
• Upon clicking the Export function, a dialog box will appear prompting the user to select
a folder to save the data.
• Following Figures shows the folder selection window.
• On selecting a folder, the data will be saved in a Text file (.txt) and a message gets
displayed as below.
Step 5-
• Another way to fill the data collection window is using Import function in the
Options.
• On clicking the Import function, a Text File selection window appears as in Following
Figure.
• Now select an appropriate file and click Open. The data will get filled in the data
collection window.
Step 6-
• After all the data has been entered in the data collection window that shown in following
Figure Press the Next button.
• Now the control will move to the media type selection window.
• If the user wants to make any correction in the data collected in any of the previous
windows, he/she can go to that window using Back button, wherever possible.
If the user selects the Block Hash option, TrueBackWin divides the entire content of
the source media into convenient block sizes before starting seizure process.
• Hash value of each block of data would be computed during seizure process and it
would be logged into a file.
• This information is used while acquiring the hard disk in the Acquire mode of
operation. Since each block has its own hash value, a distributed data integrity check
• In the case of IDE, SCSI and USB storage devices, user can specify the size of a block
in sectors for hash computation.
• The settings dialog box for specifying the block size is shown in The Following Figure.
• User cannot select a value greater than this. Further, user is limited to select a block
size which is a multiple of 128 sectors (in case of IDE/SCSI/USB) or 32 sectors (in case
of CD).
• Following Figure shows the window displaying all the details collected previously
for confirmation.
• If we want to edit or change the collected information, press Back button until the
required dialog appears.
• Choose Confirm as Correct option and press Next button to continue the seizing
process.
• It will take we to the process dialog and the seizure process begins.
Step 12- Disk Seizure Progress-
• Following Figure given below shows the various progress Information of the
seizure process.
Acquire Mode Operation
In the Acquire mode, user can specify the source media and destination media, creates an image
of the source media into the destination media by reading the source contents sector by sector
and writing it on to the destination. Meanwhile, a hash computation using any of the available
hash algorithms VIZ MD5, SHA1 and SHA256 will be performed on the data read. During
acquisition, hash values of each block will be computed and compared with that generated
during Seizure process. If there is any mismatch between hash values of any block, it will be
reported and logged into a file. Block size for copy will be the same as that is used for seizing
the storage media. Acquisition mode of operation can be initiated from the main window by
selecting the Acquire button as shown in the Figure below.
Step 1 – Click on Acquire Button
• As soon as we fill in the entire case details information, the Next button gets
enabled.
• On pressing the Next button TrueBackWin will ask for the seizure media which was
created by TrueBackWin while the same media was seized.
• Acquisition process cannot continue until we insert the correct seizure media.
• The seizure media can be a Floppy, CD-ROM or USB storage. The seizure media
selection window is shown in Following Figure.
• On clicking the OK button, the selected seizure media is checked for valid seizure
information.
• If the correct seizure media was inserted then TrueBackWin will prompt we to
confirm the information in the seizure media as shown below.
• If the No button is pressed then the process is suspended until the user presses the Next
button again.
• On pressing the “Yes” button TrueBackWin will prompt we to insert or connect the
required device with an ID number for acquisition. The following figure shows such a
dialog box.
• Following Figure shows the dialog box that follows Just Upper Figure. This is the
disk selection window.
• The listed media shows the source media information. It has two tabs showing
physical partition listing and logical drives information.
• However, if there are sterile drives or the check box is unchecked, it lists all the
available destination media which ful fills the necessary space requirements for
acquisition of the selected source disk as show below Figure.
• The destination for a TrueBackWin acquire is normally a sterile media (it’s a mass
storage media {IDE Hard Disk /SCSI Hard Disk / USB Storage Device} with any
formatted windows file systems (FAT16 / FAT32 / NTFS) partition having no data).
• If a destination storage media contains evidence file of a previous acquisition
process, TrueBackWin will consider the media as a sterile media for another
acquisition, if the crime number and police station name of the second acquisition
process are same as that of the first acquisition. This means that TrueBackWin
allows copying of multiple sources into a destination as long as the multiple sources
are related with same crime and investigated under the purview of same police
station.
• As the user press the next button TrueBackWin will does a cross check between the
selected media and the information contained the seizure floppy. If the selected
media differs from the one that was seized, a message window is displayed as shown
below:
• If we press OK we can select the correct media from the media selection dialog
again. If we press “Cancel” it will return to the Acquisition case data collection
dialog.
• The settings dialog shows the split size and file path, where the acquisition is going
to be done. Here we can change the split size by selecting from the combo box.
• On choosing “Confirmed as Correct” the Next button gets enabled. Pressing the Next
button will take we to the process dialog.
• After confirmation of seize and acquire information, TrueBackWin starts the Acquire
process. The progress of the process is shown below.
• When the process is complete, the process log will show the success and failure of hash
computation in acquisition of the seized media. One such dialog is shown below.
• Once the acquisition process is over, an acquisition report will be generated and
displayed in a window as shown in upper Figure.
• TrueBackWin saves the acquire report in an html file with evidence file name as its
base name and .HTM as its extension. Also, TrueBackWin generates a log file
containing details of the errors, if any, occurred in the acquisition of different blocks
of data. This file also will have the evidence file name as its base name and .LOG as
its extension. These files will be written in the destination media for the use in analysis
process.
VIVA VOICE QUESTION
Question 4: What tools are commonly used for data analysis in cyber forensics?
Answer: Common tools for data analysis in cyber forensics include forensic analysis
platforms such as Autopsy, Forensic Toolkit (FTK), and X-Ways Forensics, as well as open-
source tools like The Sleuth Kit and Volatility for memory forensics.
EXPERIMENT- 8
AIM:- – Implementation of OS hardening and RAM dump analysis to collect the Artifacts
and other information’s.
THEORY:-
The significance of RAM dump
• Volatile nature of RAM: RAM is a volatile form of memory that holds data
temporarily while a computer is powered on. Once the system is shut down, the contents
of RAM are lost. Therefore, capturing a RAM dump becomes essential to preserve
valuable evidence that may not be available through traditional disk-based analysis.
• Dynamic and live information: RAM contains real-time information about running
processes, active network connections, open files, encryption keys, passwords, and
other critical artifacts. Analyzing the RAM dump allows forensic investigators to access
this dynamic and live information, providing insights into the state of the system at the
time of the incident.
• Uncovering hidden or encrypted data: RAM often holds data that may not be easily
accessible through traditional file system analysis. It can reveal information about
active malware, hidden processes, encrypted data in memory, or remnants of deleted
files, offering a wealth of evidence that can be crucial to an investigation
• Alternatively, we can select Capture memory from the File dropdown menu inside FTK
Imager as illustrated in screenshot below:
• Once we select Capture memory, provide a destination path where we wish to save
the dump file. Alternatively, we can select to include pagefile. After that, the process of
capturing memory will begin.
• The file with the name “memdump.mem” is the RAM capture file.
VIVA VOICE QUESTION
Question 3: What types of artifacts can be collected from RAM dump analysis?
Answer: Artifacts collected from RAM dump analysis include process listings, network
connections, loaded drivers and DLLs, registry keys, open files and handles, and remnants of
user activity such as keystrokes and clipboard contents.
Question 5: What challenges may arise during OS hardening and RAM dump analysis?
Answer: Challenges during OS hardening may include compatibility issues with applications,
complexity of configuration settings, and balancing security with usability. Challenges during
RAM dump analysis may include capturing a reliable snapshot of memory, interpreting
volatile data, and analyzing large datasets efficiently.