Live Forensic RAM analysis Windows 10 - FTK Imager - Extract and recover jpeg picture file from RAM.

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 ม.ค. 2025

ความคิดเห็น •

  • @CyDig
    @CyDig  11 หลายเดือนก่อน

    Please consider sharing my videos.
    Recover word document docx from Network Traffic using Wireshark | An investigation into Ann Bad AIM th-cam.com/video/T193mUn5a2I/w-d-xo.htmlsi=P6O1kOjSthS5Idp7
    Searching All Areas of the Digital Forensic Image for Deleted Text Using Linux Commands Grep | XXD th-cam.com/video/dDgnU_o2lYA/w-d-xo.htmlsi=-CTJbCKrLKrZxbmU
    Digital Forensic Report Template | Expert Witness Report Template th-cam.com/video/9P4UlI4cLJ4/w-d-xo.htmlsi=T4XDigEELPy2yfIT
    Digital Forensic Investigation Case in OpenText EnCase 23 | Part 1 How to add evidence files
    th-cam.com/video/YyHYygkbPQ8/w-d-xo.htmlsi=q59JBrjEGLwgshg6
    Discover Cybersecurity Degree in the UK 2024 | Uncover the Secrets to Choosing the Right University
    th-cam.com/video/SCSpCXrAXn8/w-d-xo.htmlsi=41d88KT96uq33baZ
    How to Write Project Proposal using ChatGPT for UG, MSc, and PhD | Full Tutorial
    th-cam.com/video/kw2hX0Xla1w/w-d-xo.htmlsi=73opdAdCAIYK-usN
    Penetration Testing & Ethical Hacking | XMAS scan Vs SYN scan | Understand them U Nmap and WireShark
    th-cam.com/video/LIcyExXpLhY/w-d-xo.htmlsi=KmCz4S0LR7bbyCMY
    How to get network connection information ( telnet ) from RAM memory? Using volatility 3. Password ?
    th-cam.com/video/Nh9H3qQ8wBY/w-d-xo.htmlsi=KEl-f18o3WlgQpsL
    How to make a Forensic Image with FTK Imager | Forensic Acquisition in Windows | Physical Disk Image
    th-cam.com/video/8fJWQilA9U8/w-d-xo.htmlsi=SMN-RP7m4rjdPVM9
    Live Forensic RAM analysis Windows 10 - FTK Imager - Extract and recover jpeg picture file from RAM. th-cam.com/video/v7HdicjMtPU/w-d-xo.htmlsi=CgY4QNAij1FPtuAI

  • @SK-ju8si
    @SK-ju8si 5 หลายเดือนก่อน +2

    Sir, I followed your instruction.. Getting a RAM dump file that contains the complete content of the target jpeg file was impossible for me. I was able to locate the jpeg file searching a jpeg standard header (signature) and the target jpeg file's metadata (camera company). However, the RAM dump file only had jpeg header, not the entire content. I noticed that my jpeg file content was segmented everywhere in RAM and was impossible to retrieve.... Can I ask how did you capture the RAM to begin with? For me, what I did was basically opening the Jpeg file right before capturing RAM. I used Magnet Ram Capture

    • @CyDig
      @CyDig  5 หลายเดือนก่อน +1

      What you have done is correct. You open the file (picture) and then take the RAM Image. As when you open any file it will load to the RAM. To help you recover any picture, try first with very small picture in size and follow my stepsin thevideo. I am 100% sure you will be abletorecover it.
      Thanks

    • @SK-ju8si
      @SK-ju8si 5 หลายเดือนก่อน +1

      @@CyDigSir, I tried with very small (800 B) size JPG and it worked!! I am so happy. I was struggling with this issue for couple hours 😅 thank you and have a great day

    • @CyDig
      @CyDig  5 หลายเดือนก่อน

      @@SK-ju8si Great. Well done!

  • @jackkennedy7052
    @jackkennedy7052 2 ปีที่แล้ว +1

    thanks so much huge help :)

    • @CyDig
      @CyDig  2 ปีที่แล้ว

      Glad to hear it!

  • @CyDig
    @CyDig  2 ปีที่แล้ว

    In you know another way to extract photos or pictures from RAM, please write it in the comments.

    • @fn0rd-f5o
      @fn0rd-f5o 2 ปีที่แล้ว +1

      save them from the program to the disk? think pretty much anything saves images these days.

  • @jm4747-o5v
    @jm4747-o5v ปีที่แล้ว +1

    can we save malware?

    • @CyDig
      @CyDig  ปีที่แล้ว

      Yes and No, as It depends on the size and behaviour of the Malware.
      However, you can analyse the behaviour of the Malware, such as network connection, register files opened, etc...

    • @CyDig
      @CyDig  ปีที่แล้ว

      👍