Extracting Windows command line details from physical memory

Détails

Ressource 1Télécharger: paper-extracting_windows_command_line_details_from_physical_memory.pdf (559.08 [Ko])
Etat: Public
Version: de l'auteur⸱e
ID Serval
serval:BIB_1964BC5C15A3
Type
Article: article d'un périodique ou d'un magazine.
Collection
Publications
Titre
Extracting Windows command line details from physical memory
Périodique
Digital Investigation
Auteur⸱e⸱s
Stevens Richard M., Casey Eoghan
ISSN
1742-2876
Statut éditorial
Publié
Date de publication
2010
Volume
7
Pages
S57 - S63
Langue
anglais
Résumé
Current memory forensic tools concentrate mainly on system-related information like processes and sockets. There is a need for more memory forensic techniques to extract user-entered data retained in various Microsoft Windows applications such as the Windows command prompt. The command history is a prime source of evidence in many intrusions and other computer crimes, revealing important details about an offender’s activities on the subject system. This paper dissects the data structures of the command prompt history and gives forensic practitioners a tool for reconstructing the Windows command history from a Windows XP memory capture. At the same time, this paper demonstrates a methodology that can be generalized to extract user-entered data on other versions of Windows.
Open Access
Oui
Création de la notice
16/01/2019 22:48
Dernière modification de la notice
20/08/2019 13:50
Données d'usage