Memory DumpAnalysis in Capture The Flag: Using Volatility 3 to Extract Hidden Files

dc.contributor.advisorArif, Hamdani
dc.contributor.authorYusriyah, Isnaeni Hari
dc.contributor.authorArapenta, Joy Gilbert
dc.contributor.authorTambunan, Jean Tirstan
dc.date.accessioned2025-01-04T01:42:48Z
dc.date.issued2024-06-12
dc.descriptionThis research analyzes memory dumps in Capture The Flag (CTF) cybersecurity competitions using computer forensics techniques. It focuses on uncovering hidden files in memory using the Volatility Framework. The methodology follows the computer forensics investigation model, including acquisition, analysis, and extraction. Various Volatility plugins are used to identify suspicious processes, locate hidden files, and find passwords for encrypted files. The results demonstrate the effectiveness of the Volatility Framework in extracting important information from memory dumps, which is valuable in the context of cybersecurity competitions like CTF.
dc.description.abstractThe field of study that examines how to uncover, collect, analyze, and present digital evidence from electronic devices is called computer forensics. This research focuses on the analysis of memory dumps in the Capture The Flag (CTF) cybersecurity competition with the aim of uncovering hidden files that may be concealed in memory by an attacker. Conducting analysis on memory dumps is an important technique in digital forensics and security incident investigation to uncover suspicious activities and hidden evidence that is not available on storage media. The Volatility Framework is utilized as the main framework for analyzing memory dumps. The analysis process adopts the general stages of the computer forensics investigation model, including acquisition, analysis, and extraction. Various Volatility plugins and modules, such as imageinfo, pslist, cmdline, filescan, grep, and dumpfiles, are optimized to identify suspicious processes, locations of hidden files, and passwords required to open encrypted files. This research shows that the Volatility Framework is an effective memory forensics tool for extracting important information from memory dumps, including hidden files, which is highly useful in the context of cybersecurity competitions such as Capture The Flag (CTF).
dc.identifier.citationIEEE
dc.identifier.kodeprodiKODEPRODI57302#REKAYASA KEAMANAN SIBER
dc.identifier.nidnNIDN0001129002
dc.identifier.nimNIM4332001032
dc.identifier.nimNIM4332001026
dc.identifier.nimNIM4332001016
dc.identifier.urihttp://103.209.1.147:4000/handle/PL029/3240
dc.language.isoen_US
dc.publisherPoliteknik Negeri Batam
dc.subjectSOCIAL SCIENCES::Statistics, computer and systems science::Informatics, computer and systems science::Informatics
dc.subjectSOCIAL SCIENCES::Statistics, computer and systems science::Informatics, computer and systems science::Information technology
dc.subjectSOCIAL SCIENCES::Social sciences::Education
dc.titleMemory DumpAnalysis in Capture The Flag: Using Volatility 3 to Extract Hidden Files
dc.typeArticle

Files

Original bundle

Now showing 1 - 3 of 3
Repository Politeknik Negeri Batam
Name:
4332001032_Tugas Akhir/Artikel.pdf
Size:
670.41 KB
Format:
Adobe Portable Document Format
Repository Politeknik Negeri Batam
Name:
Lembar_Pengesahan.pdf
Size:
85.08 KB
Format:
Adobe Portable Document Format
Repository Politeknik Negeri Batam
Name:
Borang_Publikasi.pdf
Size:
153.84 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Repository Politeknik Negeri Batam
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: