Description: My presentation will showcase my success with The Shmoo Group's data destruction challenge from their DEFCON 19 talk And That's How I Lost an Eye. I'll discuss my prototypical 3U-sized box of hard drive obliteration, capable of rendering multiple hard drives as forensically useful as a wet noodle within seconds minus the collateral damage. My presentation will delve into the intricacies of generating and containing high temperature plasma, and how I put it together into one crazy prototype.
I will discuss the unfortunate practical limitations of my initial plasma generating device, such as power consumption and required electrode laying in an ISO-5 cleanroom; and why several microwave ovens were sacrificed in the name of science to subject sFAndroid Mind Reading: Memory Acquisition and Analysis with DMD and Volatility - Joe Sylve
This talk will present the first methodology and toolset for acquisition and deep analysis of volatile physical memory from Android devices. We will discuss some of the challenges in performing Android memory acquisition, discuss our new kernel module for dumping memory, and specifically addresses the difficulties in developing device-independent acquisition tools. We will also present analyses of kernel structures using newly developed Volatility functionality.
Our acquisition tool, currently named DMD, supports dumping memory to either the SD card on the phone or to the local network. Not only will we release our tool at ShmooCon, but we will also allow attendees to rename it.
This presentation will illustrate the potential that deep memory analysis offers to digital forensics investigators, hackers, and anyone else who's just wondering what their phone has been thinking about all day.
Joe Sylve is a Senior Security Researcher at Digital Forensics Solutions, where he conducts forensic investigations and penetration tests, engineers new applications to support security and forensics functions, performs training on incident response handling and digital forensics, and conducts research on cutting edge techniques in computer security.
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.