Visible to the public Extracting network connections from Windows 7 64-bit physical memory

TitleExtracting network connections from Windows 7 64-bit physical memory
Publication TypeConference Paper
Year of Publication2015
AuthorsJaina, J., Suma, G. S., Dija, S., Thomas, K. L.
Conference Name2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
Keywordschats, Computers, Conferences, cyber crime investigation, cyber forensics investigation, data structures, digital forensics, Forensics, kernel data structures, Live Forensics, local IP addresses, memory dump, memory forensics, messages, Network connections, network connections extraction, Physical Memory, Pool Allocations, port information, Ports (Computers), pubcrawl170109, RAM, Random access memory, remote addresses, Resource management, user credentials, user interfaces, Windows 7 physical memory, word length 64 bit
Abstract

Nowadays, Memory Forensics is more acceptable in Cyber Forensics Investigation because malware authors and attackers choose RAM or physical memory for storing critical information instead of hard disk. The volatile physical memory contains forensically relevant artifacts such as user credentials, chats, messages, running processes and its details like used dlls, files, command and network connections etc. Memory Forensics involves acquiring the memory dump from the Suspect's machine and analyzing the acquired dump to find out crucial evidence with the help of windows pre-defined kernel data structures. While retrieving different artifacts from these data structures, finding the network connections from Windows 7 system's memory dump is a very challenging task. This is because the data structures that store network connections in earlier versions of Windows are not present in Windows 7. In this paper, a methodology is described for efficiently retrieving details of network related activities from Windows 7 x64 memory dump. This includes remote and local IP addresses and associated port information corresponding to each of the running processes. This can provide crucial information in cyber crime investigation.

DOI10.1109/ICCIC.2015.7435745
Citation Keyjaina_extracting_2015