RAM Analysis
If evidence of compromise is never written to a hard drive, we cannot rely on disk forensics!
Volatile memory has a high potential to contain:
malicious code from an infection, in whole or in part, because it must be loaded in memory to execute.
evidence that system resources were allocated by the malicious code.
encryption keys and passwords, or the plain-text contents of files before they were encrypted.
Last updated