DocumentCode :
3369959
Title :
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File
Author :
Lijuan Xu ; Lianhai Wang
Author_Institution :
Shandong Provincial Key Lab. of Comput. Network, Shandong Comput. Sci. Center, Jinan, China
fYear :
2013
fDate :
14-15 Dec. 2013
Firstpage :
716
Lastpage :
720
Abstract :
Forensics analysis of physical memory is a key point in computer living forensics. Most of the research carried out focusing on enumerating processes and threads by accessing memory resident objects. However, collecting case sensitive information from the extracted memory content is import and difficult in computer forensics. Password plaintext is one of the most concerning sensitive information to an investigator. The traditional methods to extract system logged in password plaintext mainly rely on cracker tools, whose success rate depend on the password complexity. The important contribution of the paper is a new technique for extracting system logged-in password plaintext from physical memory. It allows extracting arbitrary length system logged-in password plaintext. The proposed method can extract system logged-in password plaintext of Windows XP and Windows 7.
Keywords :
authorisation; digital forensics; file organisation; Windows 7; Windows XP; Windows memory image file; arbitrary length system logged-in password plaintext extraction; computer forensics analysis; password complexity; physical memory forensics analysis; system logged-in password extraction; Computers; Data mining; Digital forensics; Message systems; Operating systems; Security; computer forensics; logged-in password; memory analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security (CIS), 2013 9th International Conference on
Conference_Location :
Leshan
Print_ISBN :
978-1-4799-2548-3
Type :
conf
DOI :
10.1109/CIS.2013.156
Filename :
6746524
Link To Document :
بازگشت