![]() Swapping "password" for email addresses, known passwords of the fake accounts, website names etc. I analyzed the memory dump using SIFT Workstation, in the terminal I used the command strings windows7.raw | grep “password” > output.txt (2009) Techniques and Tools for Recovering and Analysing Data from Volatile Memory.Īfter gaining an understanding memory extracting and analysis I created a windows 7 virtual machine with 2 GB of RAM, installed some browsers made a few accounts on various websites, installed LastPass, restarted the machine and captured a memory dump using DUMPIT (Search DUMP IT Memory dump). It was the last one I found to be more helpfulĪmari, K. First off I used google academic to find papers about LastPass, password managers and memory forensics.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |