Home Acquiring RAM Through Cooling Methods
Post
Cancel

Acquiring RAM Through Cooling Methods

Digital forensic investigators encounter significant challenges when dealing with locked computers or encrypted storage systems. Research conducted by Gupta and Nisbet from Auckland University of Technology’s Security \& Forensic Research Group demonstrates a practical technique using RAM cooling methods to preserve memory contents for forensic analysis. Click here to view research paper

The Research Problem

Forensic investigation guidelines typically advise that running computers should be shut down by removing the power supply to preserve hard disk evidence[^3]. However, this standard procedure destroys valuable forensic evidence stored in volatile RAM, including web browsing history, recently run programs, usernames, passwords, and encryption keys.

The research specifically addresses two critical forensic challenges: locked user accounts on running computers and encrypted files that present particular difficulties for investigators attempting to capture forensic images of RAM.

Experimental Setup

Hardware Configuration:

  • 1GB DDR3 non-error correction RAM

  • Samsung 2.4GHz CPU

  • Windows 7 operating system[^3]

Data Population Protocol:

The researchers performed six specific actions to populate RAM with forensically relevant data:

  1. Logged into Windows 7 with administrator credentials

  2. Opened text files and copied content to clipboard

  3. Started Apache HTTP web server and MySQL database

  4. Unlocked TrueCrypt file container and opened several files

  5. Executed DOS commands

  6. Launched web browser and logged into Facebook account

Testing Methodology

Baseline Test:

Removing RAM at normal temperature (35°C) and reinserting after 10 minutes resulted in only 0.2% data recovery.

Three Cooling Methods Tested:

Cooling MethodTemperatureTime Delay(s)Data Recovery
Liquid Nitrogen-196°C10 min, 1 hr, 2.5 hrs99.81%, 98.84%, 93.95%
Freezing Spray-40°C10 min96.45%
Ice Submersion10°C10 min99.71%

Analysis Process

After cooling, RAM modules were reinserted into the same computer and booted from a USB stick containing DumpIT Linux memory dumping software. The software immediately dumped RAM contents to USB storage for later analysis.

Critical Forensic Discovery

The research successfully recovered 512-bit AES encryption keys used by TrueCrypt in all cooling experiments. This finding demonstrates the ability to decrypt previously inaccessible encrypted files and containers, representing a significant breakthrough for forensic investigators dealing with encrypted evidence.

This research provides empirically proven results through controlled experiments with measurable, reproducible outcomes[^1][^3]. The study demonstrates quantitative data recovery percentages across multiple cooling methods and time delays, validating the practical effectiveness of RAM cooling techniques for forensic investigations.

The successful recovery of TrueCrypt encryption keys specifically validates the forensic value of these techniques in real-world scenarios where encrypted evidence would otherwise remain inaccessible to investigators

This post is licensed under CC BY 4.0 by the author.

img Amcache:The Most Misunderstood Artifact

-