![]() In order to perform a cold boot attack, an expert boots the computer from a portable media (typically a USB flash drive). The term was born after the “cold boot attack”, which in turn defines a very specific kind of attack allowing to extract secrets (such as encryption keys) from the system’s volatile memory. What is cold system analysis?Ĭold system analysis is frequently used in the field, yet the term itself is not quite as common as “live system analysis”, so it needs a bit of an explanation. Why and when would you use cold system analysis, what can you do and what benefits does it bring compared to the traditional approach? Read along to find out. Instead, cold analysis can be viewed as an intermediary measure with live system analysis on the one end and the examination of a forensic disk image on another. As opposed to live system analysis, experts performing the cold analysis are not dealing with authenticated user sessions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |