WindowsSCOPE

WindowsSCOPE
Developer(s) WindowsSCOPE
Platform Windows, Cloud
Available in English
Type Computer forensics, Reverse Engineering
Website http://www.windowsscope.com

WindowsSCOPE is a memory forensics and reverse engineering product for Windows used for acquiring and analyzing volatile memory.[1] One of its uses is in the detection and reverse engineering of rootkits and other malware.[2] WindowsSCOPE supports acquisition and analysis of Windows computers running Windows XP through Windows 10.

Acquisition

WindowsSCOPE supports both software-based acquisition as well as hardware-assisted methods for both locked and unlocked computers. WindowsSCOPE add-on hardware for memory acquisition uses the PCI Express bus for direct access to system memory. Memory snapshots acquired with WindowsSCOPE are stored in a repository. Memory snapshots in the repository can be compared to track changes in the system over time.[2]

Analysis

WindowsSCOPE shows processes, DLLs, and drivers running the computer at the time of the memory snapshot as well as open network sockets, file handles, and registry key handles. It also provides disassembly and control flow graphing for executable code. WindowsSCOPE Live is a version of the tool that allows analysis to be performed from a mobile device.[3]

References

  1. Klanke, Russ. "Digital Forensics Links". Aggressive Virus Defense. Retrieved 10 April 2012.
  2. 1 2 Le Masle, Adrien. "Detecting the HackerDefender rootkit using WindowsSCOPE". Imperial College London. Retrieved 10 April 2012.
  3. Storm, Darlene. "Encrypt: Be anti-forensic friendly to protect your Android and your privacy". Security Is Sexy. Computerworld. Retrieved 10 April 2012.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.