Extracting web browser data from Pagefile.sys
You already know that you can extract quite a lot of useful forensic artifacts from a memory dump. But there is more: you can perform memory forensics even without a memory dump! There are files on the drive that contain some parts of memory. These files are pagefile.sys
, swapfile.sys
, and hiberfil.sys
, and they are located at the system root (C:\
). In this recipe, we will show you how to extract browser data from pagefile.sys
with Belkasoft Evidence Center.
Getting ready
First of all, make sure you have Belkasoft Evidence Center with a valid licence (or a trial version) installed on your workstation. Then, use a tool of your choice, for example FTK Imager, to export data from your own system or from a forensic image you acquired earlier. As soon as you have this, you are ready to go.
How to do it...
The steps to extract web browser data from Pagefile.sys
are as follows:
- Start by creating a new case in Belkasoft Evidence Center - you already know...