Technology advancements have resulted in a notable increase in the number of cybercrime instances, posing a significant obstacle to efficient response. Data from the devices is recovered using a variety of cyber forensic methods and instruments in order to combat cybercrime. The current study paper focuses on memory forensics and Analyses memory, which contains a variety of information relevant to forensic investigation, including cryptographic keys, usernames, passwords, deleted files, deleted logs, and running processes. This information can be useful in investigating cybercrime. In conclusion, this paper highlights the vital role that RAM imaging and analysis play in digital forensics, stressing how it can be used to find volatile evidence, identify malicious activity, and try to compare few tools commonly used in this field on the basis of various attributes and tries to find out which one provides the best result.
Identifer | oai:union.ndltd.org:UPSALLA1/oai:DiVA.org:hh-53797 |
Date | January 2024 |
Creators | Sureshbabu, Kiranbabu, Mohan, Anand |
Publisher | Högskolan i Halmstad, Akademin för informationsteknologi |
Source Sets | DiVA Archive at Upsalla University |
Language | English |
Detected Language | English |
Type | Student thesis, info:eu-repo/semantics/bachelorThesis, text |
Format | application/pdf |
Rights | info:eu-repo/semantics/openAccess |
Page generated in 0.0023 seconds