The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in electronic or magnetic form (that is, digital evidence)
Forensics Analysis – Volatile Data:
- The data that is held in temporary storage in the system’s memory (including random access memory, cache memory, and the onboard memory of system peripherals such as the video card or NIC) is called volatile data because the memory is dependent on electric power to hold its contents.
- When the system is powered off or if power is disrupted, the data disappears.
How to Collect Volatile Data:
- There are lots of tools to collect volatile memory for live forensics or incident response.In this, we are going to use Belkasoft live ram Capture Tool.
- After the capture of live data of RANDOM ACCESS MEMORY, we will analyze with Belkasoft Evidence Center Ultimate Tool.
Acquisition of live Volatile Memory:
Dump File Format:
After successful capture of live Ram memory.The file will be saved in .mem extension.
Evidence File Analyser:
Belkasoft Evidence Center Ultimate Tool to analyze volatile memory.
As a forensic examiner or Incident Responder should record everything about physical device appearance, Case number, Model Number of Laptop or Desktop etc.
Click the Ram Image and enter the path of the .mem file which is live ram dump file.
Malicious Activites on the Public website
Recent File Accessed
Recent Pictures downloaded from websites which will be stored in the cache memory.
This is a relatively new and fast-growing field many forensic analysts do not know or take the advantage of these assets. Volatile memory may contain many pieces of information relevant to a forensic investigation, such as passwords, cryptographic keys, and other data.