{"id":4030,"date":"2015-11-24T00:05:35","date_gmt":"2015-11-23T16:05:35","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4030"},"modified":"2015-11-24T00:06:08","modified_gmt":"2015-11-23T16:06:08","slug":"rekall-memory-forensic-framework","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/11\/rekall-memory-forensic-framework\/","title":{"rendered":"Rekall – Memory Forensic Framework"},"content":{"rendered":"

Rekall is a memory forensic framework that provides an end-to-end solution to incident responders and forensic analysts. From state of the art acquisition tools, to the most advanced open source memory analysis framework.<\/p>\n

\"Rekall<\/p>\n

It strives to be a complete end-to-end memory forensic framework, encapsulating acquisition, analysis, and reporting. In particular Rekall is the only memory analysis platform specifically designed to run on the same platform it is analyzing: Live analysis allows us to corroborate memory artifacts with results obtained through system APIs, as well as quickly triage a system without having to write out and manage large memory images (This becomes very important for large servers where the time of acquisition leads to too much smear).<\/p>\n

The team also ensures the memory analysis tools are stable and work on all supported platforms (For example Rekall features the only memory imaging tool available for recent versions of OSX, that we know of – and it is open source and free as well!).<\/p>\n

Rekall is the only open source memory analysis tool that can work with the windows page file and mapped files. Rekall also includes a full acquisition solution (in the aff4acquire plugin) which allows the acquisition of the pagefile and all relevant mapped files (Rekall does this by executing a triaging routine during acquisition).<\/p>\n

Support<\/h3>\n

Rekall should run on any platform that supports Python.<\/p>\n

Rekall supports investigations of the following 32bit and 64bit memory images:<\/p>\n