Forensic analysis using Memory Dump

In summary, this student needs to use a tool to dump memory from a Linux system, and then use another tool to see if an attack is occurring.
  • #1
takando12
123
5
I'm in my second year in college and I've taken an Operating Systems course that has a project component.
I've been assigned Memory Forensics as my project topic.
On approaching the professor I was told that I need to attempt to attack the Linux Kernel ( I'm guessing that means I need to write a process that tries to access the Kernel space from User mode? ) and then identify the occurrence of this attack from a memory dump ( I don't know if this will happen automatically when I try to access the Kernel i.e. will the system just crash and force a memory dump? )
I've been looking up for Memory Forensics analysis tools and Volatility is one and LiMe ( Linux Memory extractor) is for creating the dump I think?
I need a sense of direction about how to proceed with this and right now I'm very confused and don't even know how to start and what to do first.
Also, I suppose I should do all of this on a Virtual Machine so I don't destroy my system?
Please do help out.
 
Technology news on Phys.org
  • #2
Put eyecatchers (unusual repeated character strings) in constants in your program, so it will be easier to find in the dump, then attempt to read a protected area of the kernel. Before running your program, start the process to capture the dump:

This is excerpted from http://www.forensicswiki.org/wiki/Tools:Memory_Imaging

Linux
LiME
Linux Memory Extractor (LiME) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports dumping memory either to the file system of the device or over the network.
Linux Memory Grabber by Hal Pomeranz
a tool to create Linux Volatility profiles and dump memory (using LiME) from an USB Key, without installation on local HDD. Very useful
/dev/crash
On Red Hat systems (and those running related distros such as Fedora or CentOS), the crash driver can be loaded to create pseudo-device /dev/crash for raw physical memory access (via command "modprobe crash"). This module can also be compiled for other Linux distributions with minor effort (see, for example, http://gleeda.blogspot.com/2009/08/devcrash-driver.html). When the crash driver is modified, compiled, and loaded on other systems, the resulting memory access device is not safe to image in its entirety. Care must be taken to avoid addresses that are not RAM-backed. On Linux, /proc/iomem exposes the correct address ranges to image, marked with "System RAM".
/dev/mem
On older Linux systems, the program dd can be used to read the contents of physical memory from the device file /dev/mem. On recent Linux systems, however, /dev/mem provides access only to a restricted range of addresses, rather than the full physical memory of a system. On other systems it may not be available at all. Throughout the 2.6 series of the Linux kernel, the trend was to reduce direct access to memory via pseudo-device files. See, for example, the message accompanying this patch: http://lwn.net/Articles/267427/.
Second Look: Linux Memory Forensics
This commercial memory forensics product ships with a modified version of the crash driver and a script for safely dumping memory using the original or modified driver on any given Linux system.
http://hysteria.sk/~niekt0/foriana/fmem_current.tgz
fmem is kernel module that creates device /dev/fmem, similar to /dev/mem but without limitations. This device (physical RAM) can be copied using dd or other tool. Works on 2.6 Linux kernels. Under GNU GPL.
lmap and pmem
pmem is a loadable kernel module that exposes /dev/pmem. lmap allows to inject the pmem functionality into existing kernel modules to bypass having to build a pmem kernel module for every different kernel version.
 

1. What is a memory dump in forensic analysis?

A memory dump is a snapshot of the contents of a computer's memory at a specific point in time. It is typically created when a computer crashes or experiences a system failure. Forensic analysts can use memory dumps to gather information about the state of a computer and its running processes at the time of the crash.

2. How is a memory dump created?

A memory dump is created by specialized software or operating system commands. In most cases, a memory dump is triggered when a computer experiences a critical error or crash. It can also be manually created by a forensic analyst using specialized tools.

3. What information can be extracted from a memory dump?

A memory dump can provide a wealth of information for forensic analysis. This includes active processes, open files, network connections, and system configurations. It can also reveal any malicious or suspicious activity that may have occurred on the computer at the time of the dump.

4. How is forensic analysis conducted using memory dumps?

Forensic analysts can use specialized tools and techniques to analyze the contents of a memory dump. This may include examining the dump for evidence of malware, tracking a user's activity, or identifying potential security breaches. The analysis process may also involve comparing the memory dump to other sources of data, such as log files or network traffic, to build a more complete picture of the incident.

5. What are the limitations of using memory dumps for forensic analysis?

While memory dumps can provide valuable information, they also have some limitations. For example, they only capture a snapshot of a computer's memory at a single point in time, so they may not provide a complete view of all activity on the system. Additionally, the analysis of memory dumps requires specialized knowledge and tools, making it a more complex process than other types of forensic analysis.

Similar threads

  • Programming and Computer Science
Replies
3
Views
1K
  • Computing and Technology
Replies
5
Views
269
  • Programming and Computer Science
Replies
6
Views
1K
  • Programming and Computer Science
Replies
4
Views
3K
  • Engineering and Comp Sci Homework Help
Replies
3
Views
670
Replies
0
Views
620
  • Programming and Computer Science
Replies
5
Views
818
Replies
5
Views
961
  • Biology and Medical
Replies
8
Views
4K
Back
Top