Abstract
Memory forensics is an essential part of any computer forensics investigation. Main memory provides valuable evidences, which may otherwise not be retrievable from hard drive. In cases when capturing main memory image is not possible, hibernation files are good source of information. The aim of this research is to show the importance of hibernation file forensics in a computer forensics investigation. Specifically, we focus on retrieving evidential information related to the use of Facebook and Instagram. Firstly, we develop a process that can simplify the task of hibernation file forensics. The proposed process explores concepts, tools, techniques and methodologies most suitable for Windows 10 hibernation file acquisition and analysis. Subsequently, we use the proposed process to experimentally demonstrate the extraction of critical personal and confidential information related to Facebook and Instagram activities, from hibernation file. The extracted data can be used to establish a link between the suspect and the evidences.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cai, L., Sha, J., Qian, W.: Study on forensic analysis of physical memory. In: 2nd International Symposium on Computer, Communication, Control and Automation (3CA 2013), pp 221–224 (2013)
Ayers, A.L.: Windows Hibernation and Memory Forensics, A Capstone Project Submitted to the Faculty of Utica College, April 2015, UMI Number: 1586690
Singh, A., Sharma, P., Nath, R.: Role of hibernation file in memory forensics of windows 10. Int. J. Sci. Eng. Res. 7(12), 42–47 (2017), ISSN 2229-5518
Sylve, J.T., Marziale, V., Richard, G.G.: Modern windows hibernation file analysis. Dig. Invest. 20, 16–22 (2016). https://doi.org/10.1016/j.diin.2016.12.003
Carvey, H.: Windows Forensic Analysis DVD Toolkit. Syngress Publishing Inc., Burlington (2007)
Carrier, B.D., Grand, J.: A hardware-based memory acquisition procedure for digital investigations. Dig. Invest. 1, 50–60 (2004)
Ruff, N., Suiche, M.: Enter Sandman (why you should never go to sleep). In: PacSec Applied Security Conference (2007)
Mrdovic, S., Huseinovic, A., Zajko, E.: Combining static and live digital forensic analysis in virtual environment. In: 2009 XXII International Symposium on Information, Communication and Automation Technologies (2009). https://doi.org/10.1109/icat.2009.5348415
Suiche, M.: Your favorite Memory Toolkit is back… FOR FREE! – Comae Technologies. https://blog.comae.io/your-favorite-memory-toolkit-is-back-f97072d33d5c
Shariq, M., et al.: A tool for extracting static and volatile forensics artifacts of Windows 8.x Apps. IFIP Adv. Inf. Commun. Technol. Adv. Dig. Forensics XI, 462, 305–320 (2015). https://doi.org/10.1007/978-3-319-24123-4_18
Singh, A., Sharma, P., Nat, R.: Role of hibernation file in memory forensics of windows 10. Int. J. Sci. Eng. Res. 7(12), 42–47 (2016)
Malin, C.H., Casey, E., Aquilina, J.M.: Memory Forensics. Malware Forensics Field Guide for Windows Systems, 93–154 (2012). https://doi.org/10.1016/b978-1-59749-472-4.00002-0. http://index-of.es/Varios-2/Malware%20Forensics%20Field%20Guide%20for%20Windows%20Systems.pdf
Hörz, M. (n.d.): HxD - Freeware Hex Editor and Disk Editor. https://mh-nexus.de/en/hxd/
SourgeForge. (n.d.). Foremost. http://foremost.sourceforge.net/
Bulk Extractro. https://www.forensicswiki.org/wiki/Bulk_extractor
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ghafarian, A., Keskin, D. (2020). Windows 10 Hibernation File Forensics. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-030-52243-8_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52242-1
Online ISBN: 978-3-030-52243-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)