WindowsSCOPE

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WindowsSCOPE
Developer(s) WindowsSCOPE
Development status Active
Operating system Windows
Available in English
Type Computer forensics, Reverse Engineering
Website http://www.windowsscope.com

WindowsSCOPE is a memory forensics and reverse engineering product for Windows used for acquiring and analyzing volatile memory.[1] One of its uses is in the detection and reverse engineering of rootkits and other malware.[2]

Acquisition[edit]

WindowsSCOPE supports both software-based acquisition as well as hardware-assisted methods for both locked and unlocked computers. WindowsSCOPE add-on hardware for memory acquisition uses the PCI Express bus for direct access to system memory. Memory snapshots acquired with WindowsSCOPE are stored in a repository. Memory snapshots in the repository can be compared to track changes in the system over time.[2]

Analysis[edit]

WindowsSCOPE shows Processes, DLLs, and drivers running the computer at the time of the memory snapshot as well as open network sockets, file handles, and registry key handles. It also provides disassembly and control flow graphing for executable code. WindowsSCOPE Live is a version of the tool that allows analysis to be performed from a mobile device.[3]

References[edit]

  1. ^ Klanke, Russ. "Digital Forensics Links". Aggressive Virus Defense. Retrieved 10 April 2012. 
  2. ^ a b Le Masle, Adrien. "Detecting the HackerDefender rootkit using WindowsSCOPE". Imperial College London. Retrieved 10 April 2012. 
  3. ^ Storm, Darlene. "Encrypt: Be anti-forensic friendly to protect your Android and your privacy". Security Is Sexy. Computerworld. Retrieved 10 April 2012. 

External links[edit]