tag:blogger.com,1999:blog-1746946614390371171.post1961617445562160198..comments2023-05-09T02:31:13.939-07:00Comments on Computer Forensics, Malware Analysis & Digital Investigations: New version of EnCase includes stand-alone utility to capture RAMLance Muellerhttp://www.blogger.com/profile/15789264000499223230noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-1746946614390371171.post-40164924119014572012011-05-31T22:57:50.169-07:002011-05-31T22:57:50.169-07:00This comment has been removed by a blog administrator.Anonymoushttps://www.blogger.com/profile/16225748350963388747noreply@blogger.comtag:blogger.com,1999:blog-1746946614390371171.post-10380318101472134592008-06-15T04:13:00.000-07:002008-06-15T04:13:00.000-07:00Anytime you interface with a live system, you're g...Anytime you interface with a live system, you're going to leave footprints or artifacts. There have been 'forensic' and incident response applications where the authors have espoused deleting these artifacts...however, the list is never complete. IMHO, if you must interact with a live system, leave the artifacts in order to assist in establishing a legit timeline.<BR/><BR/>I would be curious how winen compares to <A HREF="http://windowsir.blogspot.com/2008/06/memory-collection-and-analysis.html" REL="nofollow">mdd</A>. Not head-to-head, per se, but use winen to dump memory, then open that dump in EnCase and dump it out to HBGary's Responder, and compare that to a similar dump from mdd.<BR/><BR/>In a way, I find it surprising that GSI is segregating itself this way...one of the things one *should* try to avoid is methods of collection that channelize the analyst into a single application for analysis. Sure, .EO<I>x</I> files can be opened and 'dumped' to dd-style format with FTK Imager, but that requires additional steps. The ability to verify information by using different tools/procedures is important in this field. <BR/><BR/>Also, it's kind of interesting that winen collects physical memory in a format that even HBGary's Responder tool doesn't recognize.<BR/><BR/>Note: this isn't a comment to bash EnCase or anyone...just pointing out some issues that should be considered when deciding to use these tools.<BR/><BR/><A HREF="http://windowsir.blogspot.com" REL="nofollow">WindowsIR</A>H. Carveyhttps://www.blogger.com/profile/08966595734678290320noreply@blogger.com