Live Forensic RAM analysis Windows 10 - FTK Imager - Extract and recover jpeg picture file from RAM.

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 12

  • @CyDig
    @CyDig  8 месяцев назад

    Please consider sharing my videos.
    Recover word document docx from Network Traffic using Wireshark | An investigation into Ann Bad AIM ruclips.net/video/T193mUn5a2I/видео.htmlsi=P6O1kOjSthS5Idp7
    Searching All Areas of the Digital Forensic Image for Deleted Text Using Linux Commands Grep | XXD ruclips.net/video/dDgnU_o2lYA/видео.htmlsi=-CTJbCKrLKrZxbmU
    Digital Forensic Report Template | Expert Witness Report Template ruclips.net/video/9P4UlI4cLJ4/видео.htmlsi=T4XDigEELPy2yfIT
    Digital Forensic Investigation Case in OpenText EnCase 23 | Part 1 How to add evidence files
    ruclips.net/video/YyHYygkbPQ8/видео.htmlsi=q59JBrjEGLwgshg6
    Discover Cybersecurity Degree in the UK 2024 | Uncover the Secrets to Choosing the Right University
    ruclips.net/video/SCSpCXrAXn8/видео.htmlsi=41d88KT96uq33baZ
    How to Write Project Proposal using ChatGPT for UG, MSc, and PhD | Full Tutorial
    ruclips.net/video/kw2hX0Xla1w/видео.htmlsi=73opdAdCAIYK-usN
    Penetration Testing & Ethical Hacking | XMAS scan Vs SYN scan | Understand them U Nmap and WireShark
    ruclips.net/video/LIcyExXpLhY/видео.htmlsi=KmCz4S0LR7bbyCMY
    How to get network connection information ( telnet ) from RAM memory? Using volatility 3. Password ?
    ruclips.net/video/Nh9H3qQ8wBY/видео.htmlsi=KEl-f18o3WlgQpsL
    How to make a Forensic Image with FTK Imager | Forensic Acquisition in Windows | Physical Disk Image
    ruclips.net/video/8fJWQilA9U8/видео.htmlsi=SMN-RP7m4rjdPVM9
    Live Forensic RAM analysis Windows 10 - FTK Imager - Extract and recover jpeg picture file from RAM. ruclips.net/video/v7HdicjMtPU/видео.htmlsi=CgY4QNAij1FPtuAI

  • @SK-ju8si
    @SK-ju8si 3 месяца назад +2

    Sir, I followed your instruction.. Getting a RAM dump file that contains the complete content of the target jpeg file was impossible for me. I was able to locate the jpeg file searching a jpeg standard header (signature) and the target jpeg file's metadata (camera company). However, the RAM dump file only had jpeg header, not the entire content. I noticed that my jpeg file content was segmented everywhere in RAM and was impossible to retrieve.... Can I ask how did you capture the RAM to begin with? For me, what I did was basically opening the Jpeg file right before capturing RAM. I used Magnet Ram Capture

    • @CyDig
      @CyDig  3 месяца назад +1

      What you have done is correct. You open the file (picture) and then take the RAM Image. As when you open any file it will load to the RAM. To help you recover any picture, try first with very small picture in size and follow my stepsin thevideo. I am 100% sure you will be abletorecover it.
      Thanks

    • @SK-ju8si
      @SK-ju8si 3 месяца назад +1

      @@CyDigSir, I tried with very small (800 B) size JPG and it worked!! I am so happy. I was struggling with this issue for couple hours 😅 thank you and have a great day

    • @CyDig
      @CyDig  3 месяца назад

      @@SK-ju8si Great. Well done!

  • @jackkennedy7052
    @jackkennedy7052 Год назад +1

    thanks so much huge help :)

    • @CyDig
      @CyDig  Год назад

      Glad to hear it!

  • @jm4747-o5v
    @jm4747-o5v Год назад +1

    can we save malware?

    • @CyDig
      @CyDig  Год назад

      Yes and No, as It depends on the size and behaviour of the Malware.
      However, you can analyse the behaviour of the Malware, such as network connection, register files opened, etc...

    • @CyDig
      @CyDig  11 месяцев назад

      👍

  • @CyDig
    @CyDig  2 года назад

    In you know another way to extract photos or pictures from RAM, please write it in the comments.

    • @fn0rd-f5o
      @fn0rd-f5o 2 года назад +1

      save them from the program to the disk? think pretty much anything saves images these days.