B. Software method
Software extraction is a much more common way for
obtaining data from RAM and it is recommended to perform
it during every computer acquisition in case the computer is
active. Tools used for acquiring RAM can be commercial
tools such as FTK Imager, Foremost, Helix, Belkasoft Live
RAM Capturer and the like and there are also many noncommercial
tools such as dd, memdump or Dumpit
[4][5][6][7][8][9]. The main problem of software solutions
occurs in case the computer is already compromised, the
offender can easily additionally hide his data from such tools
or give incorrect i.e. false data. Another deficiency of
software solutions is that, when they are initiated, they
themselves are using RAM just like all other programs and
thereby they are potentially erasing other, possibly important
information. With software tools we need to pay attention that
they leave the smallest possible footprint, receptively that
they occupy the least possible memory space. Another
important fact is that they are operating in the so called
“Kernel” mode. This means that the application itself has
more rights in the system and that it can reach more
information in the system. The main advantage of software
tools is that they are free of charge and that they simplify the
takeover of RAM so that it can be performed by untrained
personnel [12].