Forensics Workflow

Forensics workflow has great importance, especially around submitting an evidence.  If workflow is not followed, unproven method used, no academical support and only one forensics tools being used, it gives other side the leverage to put a doubt into evidence and make is inadmissible in court.

Computer -> Acquire Memory Analyze -> Use and Fuse
Running Create artefacts e.g. memory dump Extract needed Credentials Use gathering info, such as access encrypted container
Recently used Capture samples Ip addresses Fuse with other datasources e.g. IP address
Forgotten/Hidden Copy artefacts e.g. pagefile other
Recover artefacts

WINDOWS memory capture tools (more common at top)

** running machines only, if not, extract pagfile.sys or hiberfile.sys
  • Volatitity workbench1
  • BlackBag MacQuisition
  • FireEye Memoryze
  • Sumuri RECON Imager
  • Belkasoft Live RAM Capturer
  • AccessData FTK Imager
  • Advanced Data Forensics (ADF) Digital Evidence Investigator
  • ADF Triage Investigator/G2
  • Magnet RAM Capture
  • MoonSols DumpIt

LINUX

  • DumpIt
  • Memory DD
  • WinPmem