Summary
In this chapter, you learned about the cornucopia of artifacts you can recover from RAM. You learned about the different tools you can use for the collection process and the tools you can use for analysis. Remember that the tools are constantly changing with the technology, and as new operating systems are released, your primary tool may not be able to collect RAM data. Always have a backup plan in case something like that occurs.
You now have the skills to identify and capture RAM in a manner that conforms to best practices. As you analyze the RAM you have captured, you may find artifacts showing the user’s activity on the system, such as social media artifacts and passwords or encryption keys that can be recovered.
You may even find information relating to the user’s use of email, which will lead us to our next chapter, which is all about email forensics.