{"id":1555,"date":"2015-12-16T03:53:35","date_gmt":"2015-12-16T03:53:35","guid":{"rendered":"https:\/\/www.hackmethod.com\/?p=1555"},"modified":"2017-05-08T20:26:22","modified_gmt":"2017-05-08T20:26:22","slug":"hardware-random-access-memory-ram","status":"publish","type":"post","link":"https:\/\/hackmethod.com\/hardware-random-access-memory-ram\/","title":{"rendered":"Hardware &#8211; Random Access Memory (RAM)"},"content":{"rendered":"<h3><strong>Basics<\/strong><\/h3>\n<p>RAM stands for <span style=\"text-decoration: underline;\">R<\/span>andom-<span style=\"text-decoration: underline;\">A<\/span>ccess <span style=\"text-decoration: underline;\">M<\/span>emory and is commonly referred to as RAM or Memory for short. It serves as temporary storage and working space for the operating system and its applications. This allows data to be accessed (read or written) in almost real-time regardless of the physical location inside the memory as opposed to HDDs, Disc Drives, or any other mechanical media.\u00a0 In the majority of\u00a0computers, RAM is an easily upgradeable option that will increase the performance of your operating system and application usage. RAM is a volatile type of storage medium. Which means if you reboot, shutdown, or have a power loss of any sort, every bit of data residing in memory no longer exists.<\/p>\n<p><!--more--><\/p>\n<h4>There are two main types of RAM, <span style=\"text-decoration: underline;\">S<\/span>RAM and <span style=\"text-decoration: underline;\">D<\/span>RAM:<\/h4>\n<ul>\n<li><strong>SRAM<\/strong> stands for <span style=\"text-decoration: underline;\">S<\/span>tatic <span style=\"text-decoration: underline;\">R<\/span>andom-<span style=\"text-decoration: underline;\">A<\/span>ccess <span style=\"text-decoration: underline;\">M<\/span>emory.\u00a0 They are made using a semiconductors (containing\u00a04 to 6 transistors) that uses <a href=\"https:\/\/en.wikipedia.org\/wiki\/Flip-flop_(electronics)\">bistable latching circuitry (Flip-flop)<\/a> to store each bit, allowing data to be held for longer periods of time compared to DRAM.\u00a0 SRAM modules are more expensive, faster than DRAM, requires less power, and is often used as cache memory for your Central Processing Unit (CPU).\u00a0 SRAM requires periodic memory refreshing which makes this type of RAM less volatile compared to DRAM and relies on the CPU to preserve the contents.<\/li>\n<li><strong>DRAM<\/strong> stands for <span style=\"text-decoration: underline;\">D<\/span>ynamic <span style=\"text-decoration: underline;\">R<\/span>andom-<span style=\"text-decoration: underline;\">A<\/span>ccess <span style=\"text-decoration: underline;\">M<\/span>emory.\u00a0 They are made using capacitors and transistors built within an integrated circuit.\u00a0 Each capacitor and transistor pair stores 1 bit of data.\u00a0 Given the extremely small size of capacitors and transistors nowadays; billions can fit onto a single memory chip.\u00a0 DRAM modules are cheaper than SRAM, require more power than SRAM, and are the main memory in desktops, laptops, workstations and video game consoles. DRAM requires a constant memory refresh which makes this type of RAM more volatile and requires the CPU to do nothing to preserve the contents.<\/li>\n<\/ul>\n<h4><strong>Application in Hacking<\/strong><\/h4>\n<p>So why is this knowledge important when discussing hacking? When it comes to &#8220;hacking&#8221;, the one idea that should be understood is nearly everything you do, on a computer, is loaded into RAM\/Memory&#8230; application data, passwords, usernames, or encryption passphrases to name a few. With Operating Systems and applications loading data into RAM, the idea of your personal information or corporation&#8217;s data being leaked or stolen is a growing concern.\u00a0 This doesn&#8217;t mean you should worry that all your information is being harvested as we speak, I&#8217;m only making you aware if you weren&#8217;t already privy to the concept. There are numerous tools out on the web that make .dump or image files of the current state of your RAM\/Memory and a large majority of them are used for the purpose of &#8220;White Hat&#8221; analysis. A few noteworthy analysis and imaging applications include the <a href=\"http:\/\/www.volatilityfoundation.org\/\">Volatility Framework<\/a>, <a href=\"http:\/\/www.accessdata.com\/downloads.html\">FTK Imager<\/a>, <a href=\"https:\/\/www.fireeye.com\/services\/freeware\/memoryze.html\">Mandiant Memoryze<\/a>, <a href=\"https:\/\/secondlookforensics.com\/\">Second Look<\/a>, and FDPro just to name a few. This is not a complete list so don&#8217;t crucify me for not mentioning one you use frequently.<\/p>\n<h4><strong>Conclusion<\/strong><\/h4>\n<p>It may seem insignificant to discuss RAM and it&#8217;s application in the world of hacking however, I assure you it is anything but insignificant. As Security professionals it is important to know what goes on in your computer&#8217;s memory, what&#8217;s stored there, and what data you are putting at risk and perhaps knowing how an attacker sees you or your company&#8217;s RAM as their personal goldmine will motivate you to seek out ways to defend against it.\u00a0 Give it a try and see how good you are.\u00a0 You can download some of the programs I&#8217;ve mentioned and get practice images or dump files from <a href=\"http:\/\/www.forensicfocus.com\/images-and-challenges\">Forensics Focus<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Basics RAM stands for Random-Access Memory and is commonly referred to as RAM or Memory for short. It serves as temporary storage and working space for the operating system and its applications. This allows data to be accessed (read or written) in almost real-time regardless of the physical location inside the memory as opposed to [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":1709,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[52,75,63,31],"tags":[],"class_list":["post-1555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking","category-hardware","category-security","category-technology"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/10\/ramchip-e1450281153516.jpg?fit=400%2C300&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5zY4D-p5","_links":{"self":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/1555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/comments?post=1555"}],"version-history":[{"count":65,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/1555\/revisions"}],"predecessor-version":[{"id":2485,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/1555\/revisions\/2485"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media\/1709"}],"wp:attachment":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media?parent=1555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/categories?post=1555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/tags?post=1555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}