Nytro Posted November 17, 2011 Report Posted November 17, 2011 Kernel Hacking & Anti-forensics: Evading Memory AnalysisRODRIGO RUBIRABRANCO (BSDAEMON)FILIPE ALCARDE BALESTRAThis article is intended to explain, why a forensic analysis in alive system may not be recommended and why the image of thatsystem can trigger an advanced anti-forensic-capable rootkit.Since, most of the operating systems havethe same approach in this regard, mostexamples covered here in Linux can beapplied to similar situations in other operatingsystems too.An overview of the kernel internals and thestructure and working of x86 architecture will alsobe given, along with the differences between otherarchitectures.IntroductionA lot of tools [5] have been developed to analyzea live system in order to detect an intrusion (likeinstalled rootkits [7]).This article tries to explain some presentations[8] that showed problems in this existent model,explaining the risks of this act and when can it beaccepted.Dowbload:http://www.kernelhacking.com/rodrigo/docs/AntiForense.pdf Quote