DocumentCode
3369959
Title
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File
Author
Lijuan Xu ; Lianhai Wang
Author_Institution
Shandong Provincial Key Lab. of Comput. Network, Shandong Comput. Sci. Center, Jinan, China
fYear
2013
fDate
14-15 Dec. 2013
Firstpage
716
Lastpage
720
Abstract
Forensics analysis of physical memory is a key point in computer living forensics. Most of the research carried out focusing on enumerating processes and threads by accessing memory resident objects. However, collecting case sensitive information from the extracted memory content is import and difficult in computer forensics. Password plaintext is one of the most concerning sensitive information to an investigator. The traditional methods to extract system logged in password plaintext mainly rely on cracker tools, whose success rate depend on the password complexity. The important contribution of the paper is a new technique for extracting system logged-in password plaintext from physical memory. It allows extracting arbitrary length system logged-in password plaintext. The proposed method can extract system logged-in password plaintext of Windows XP and Windows 7.
Keywords
authorisation; digital forensics; file organisation; Windows 7; Windows XP; Windows memory image file; arbitrary length system logged-in password plaintext extraction; computer forensics analysis; password complexity; physical memory forensics analysis; system logged-in password extraction; Computers; Data mining; Digital forensics; Message systems; Operating systems; Security; computer forensics; logged-in password; memory analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Security (CIS), 2013 9th International Conference on
Conference_Location
Leshan
Print_ISBN
978-1-4799-2548-3
Type
conf
DOI
10.1109/CIS.2013.156
Filename
6746524
Link To Document