Volatility - CheatSheet
Volatility - CheatSheet
RootedCON è l'evento sulla sicurezza informatica più rilevante in Spagna e uno dei più importanti in Europa. Con la missione di promuovere la conoscenza tecnica, questo congresso è un punto di incontro bollente per professionisti della tecnologia e della sicurezza informatica in ogni disciplina.
Se vuoi qualcosa di veloce e pazzo che lancerà diversi plugin di Volatility in parallelo, puoi utilizzare: https://github.com/carlospolop/autoVolatility
Installazione
volatility3
Metodo1
Questo comando restituisce informazioni sull'immagine del dump di memoria, come l'architettura, il sistema operativo e la versione del kernel.
Metodo2
Questo comando elenca tutti i processi attivi nel dump di memoria.
Metodo3
Questo comando visualizza la struttura ad albero dei processi nel dump di memoria.
Metodo4
Questo comando mostra gli argomenti della riga di comando per ogni processo nel dump di memoria.
Metodo5
Questo comando elenca tutte le DLL caricate per ogni processo nel dump di memoria.
Comandi di Volatility
Accedi al documento ufficiale in Riferimento dei comandi di Volatility
Una nota su plugin "list" vs "scan"
Volatility ha due approcci principali ai plugin, che a volte si riflettono nei loro nomi. I plugin "list" cercheranno di navigare attraverso le strutture del kernel di Windows per recuperare informazioni come i processi (individuare e scorrere la lista collegata delle strutture _EPROCESS
in memoria), le handle del sistema operativo (individuare e elencare la tabella delle handle, dereferenziare eventuali puntatori trovati, ecc). Più o meno si comportano come farebbe l'API di Windows se richiesto, ad esempio, di elencare i processi.
Ciò rende i plugin "list" abbastanza veloci, ma altrettanto vulnerabili all'API di Windows alla manipolazione da parte di malware. Ad esempio, se il malware utilizza DKOM per scollegare un processo dalla lista collegata _EPROCESS
, non apparirà nel Task Manager e nemmeno nella pslist.
I plugin "scan", d'altra parte, adotteranno un approccio simile a quello di estrarre la memoria per le cose che potrebbero avere senso quando dereferenziate come strutture specifiche. Ad esempio, psscan
leggerà la memoria e cercherà di creare oggetti _EPROCESS
da essa (utilizza la scansione del pool-tag, che cerca stringhe di 4 byte che indicano la presenza di una struttura di interesse). Il vantaggio è che può individuare processi che sono usciti e anche se il malware manomette la lista collegata _EPROCESS
, il plugin troverà comunque la struttura che giace in memoria (poiché deve ancora esistere per far funzionare il processo). Lo svantaggio è che i plugin "scan" sono un po' più lenti dei plugin "list" e talvolta possono produrre falsi positivi (un processo che è uscito troppo tempo fa e ha avuto parti della sua struttura sovrascritte da altre operazioni).
Da: http://tomchop.me/2016/11/21/tutorial-volatility-plugins-malware-analysis/
Profili di sistema operativo
Volatility3
Come spiegato nel file readme, è necessario inserire la tabella dei simboli del sistema operativo che si desidera supportare all'interno di volatility3/volatility/symbols. I pacchetti delle tabelle dei simboli per i vari sistemi operativi sono disponibili per scaricare su:
Volatility2
Profilo esterno
È possibile ottenere l'elenco dei profili supportati eseguendo:
Se vuoi utilizzare un nuovo profilo che hai scaricato (ad esempio uno per Linux), devi creare la seguente struttura di cartelle: plugins/overlays/linux e mettere all'interno di questa cartella il file zip contenente il profilo. Successivamente, ottieni il numero dei profili utilizzando:
Puoi scaricare i profili di Linux e Mac da https://github.com/volatilityfoundation/profiles
Nel frammento precedente puoi vedere che il profilo si chiama LinuxCentOS7_3_10_0-123_el7_x86_64_profilex64
, e puoi usarlo per eseguire qualcosa come:
Scoprire il Profilo
Questo comando restituisce informazioni di base sul dump di memoria, come l'architettura, il sistema operativo e la versione del kernel. Queste informazioni sono utili per selezionare il profilo corretto per l'analisi successiva.
Analisi dei Processi
Questo comando elenca tutti i processi presenti nel dump di memoria, fornendo informazioni come il PID (Process ID), il nome del processo e il PID del processo padre. Queste informazioni possono essere utili per identificare processi sospetti o potenzialmente dannosi.
Analisi delle Connessioni di Rete
Questo comando elenca tutte le connessioni di rete attive nel dump di memoria, fornendo informazioni come gli indirizzi IP e le porte associate. Queste informazioni possono essere utili per individuare attività di rete sospette o potenzialmente dannose.
Analisi delle DLL Caricate
Questo comando elenca tutte le DLL (Dynamic Link Libraries) caricate nei processi presenti nel dump di memoria. Queste informazioni possono essere utili per individuare DLL sospette o potenzialmente dannose.
Analisi delle Connessioni di Rete
Questo comando elenca tutte le connessioni di rete attive nel dump di memoria, fornendo informazioni come gli indirizzi IP e le porte associate. Queste informazioni possono essere utili per individuare attività di rete sospette o potenzialmente dannose.
Analisi delle Attività di Registrazione
Questo comando visualizza le informazioni relative alle attività di registrazione nel dump di memoria, come la data e l'ora dell'ultima accensione del sistema. Queste informazioni possono essere utili per determinare il periodo di attività del sistema.
Analisi delle Attività di Esecuzione
Questo comando elenca tutti i comandi eseguiti nel dump di memoria, fornendo informazioni come il PID del processo e il comando eseguito. Queste informazioni possono essere utili per individuare attività sospette o potenzialmente dannose.
Analisi dei File Aperti
Questo comando elenca tutti i file aperti nel dump di memoria, fornendo informazioni come il PID del processo, il nome del file e il tipo di accesso. Queste informazioni possono essere utili per individuare file sospetti o potenzialmente dannosi.
Analisi delle Attività di Registrazione
Questo comando visualizza le informazioni relative alle attività di registrazione nel dump di memoria, come la data e l'ora dell'ultima accensione del sistema. Queste informazioni possono essere utili per determinare il periodo di attività del sistema.
Analisi delle Attività di Esecuzione
Questo comando elenca tutti i comandi eseguiti nel dump di memoria, fornendo informazioni come il PID del processo e il comando eseguito. Queste informazioni possono essere utili per individuare attività sospette o potenzialmente dannose.
Analisi dei File Aperti
Questo comando elenca tutti i file aperti nel dump di memoria, fornendo informazioni come il PID del processo, il nome del file e il tipo di accesso. Queste informazioni possono essere utili per individuare file sospetti o potenzialmente dannosi.
Differenze tra imageinfo e kdbgscan
Da qui: A differenza di imageinfo che fornisce solo suggerimenti di profilo, kdbgscan è progettato per identificare positivamente il profilo corretto e l'indirizzo KDBG corretto (se ce ne sono più di uno). Questo plugin scansiona le firme di KDBGHeader collegate ai profili di Volatility e applica controlli di coerenza per ridurre i falsi positivi. La verbosità dell'output e il numero di controlli di coerenza che possono essere eseguiti dipendono dal fatto che Volatility possa trovare un DTB, quindi se conosci già il profilo corretto (o se hai un suggerimento di profilo da imageinfo), assicurati di utilizzarlo.
Fai sempre attenzione al numero di processi che kdbgscan ha trovato. A volte imageinfo e kdbgscan possono trovare più di un profilo adatto, ma solo quello valido avrà qualche processo correlato (Questo perché per estrarre i processi è necessario l'indirizzo KDBG corretto).
KDBG
Il blocco del debugger del kernel, chiamato KDBG da Volatility, è fondamentale per le attività forensi eseguite da Volatility e vari debugger. Identificato come KdDebuggerDataBlock
e di tipo _KDDEBUGGER_DATA64
, contiene riferimenti essenziali come PsActiveProcessHead
. Questo riferimento specifico punta all'inizio della lista dei processi, consentendo l'elenco di tutti i processi, il che è fondamentale per un'analisi approfondita della memoria.
Informazioni sul sistema operativo
Il plugin banners.Banners
può essere utilizzato in vol3 per cercare i banner di Linux nel dump.
Hash/Password
Estrai gli hash SAM, le credenziali memorizzate nella cache del dominio e i segnreti lsa.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> vadinfo -p <pid>
: This command displays information about the virtual address space for a specific process.volatility -f <memory_dump> vadtree -p <pid>
: This command displays the virtual address space tree for a specific process.volatility -f <memory_dump> memdump -p <pid> -D <output_directory>
: This command dumps the memory of a specific process to a file.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <registry_key>
: This command displays the contents of a specific registry key in the memory dump.volatility -f <memory_dump> dumpregistry -D <output_directory>
: This command dumps the entire registry from the memory dump to a file.
Volatility Plugins
Volatility also supports plugins that provide additional functionality. To use a plugin, simply specify it with the -p
option followed by the plugin name. For example:
Some popular Volatility plugins include:
malfind
: Scans the memory dump for potentially malicious code.timeliner
: Extracts timeline information from the memory dump.dumpfiles
: Extracts files from the memory dump.hivelist
: Lists the registry hives in the memory dump.printkey
: Displays the contents of a specific registry key in the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis. By using the commands and plugins provided by Volatility, you can extract valuable information from memory dumps and perform in-depth forensic analysis.
Dump di memoria
Il dump di memoria di un processo estrarrà tutto lo stato attuale del processo. Il modulo procdump estrarrà solo il codice.
RootedCON è l'evento di sicurezza informatica più rilevante in Spagna e uno dei più importanti in Europa. Con la missione di promuovere la conoscenza tecnica, questo congresso è un punto di incontro vivace per i professionisti della tecnologia e della sicurezza informatica in ogni disciplina.
Processi
Elencare i processi
Cerca processi sospetti (per nome) o inesperati (ad esempio un cmd.exe come figlio di iexplorer.exe). Potrebbe essere interessante confrontare il risultato di pslist con quello di psscan per identificare processi nascosti.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
Dump proc
Volatility è uno strumento potente per l'analisi di dump di memoria. Può essere utilizzato per estrarre informazioni preziose dai dump di memoria, come processi in esecuzione, connessioni di rete, registri di sistema e altro ancora. Di seguito sono riportati alcuni comandi di Volatility comuni per l'analisi dei dump di memoria:
imageinfo
: restituisce informazioni sull'immagine del dump di memoria, come l'architettura, il sistema operativo e la versione.pslist
: elenca tutti i processi in esecuzione nel dump di memoria.pstree
: visualizza una rappresentazione ad albero dei processi nel dump di memoria.dlllist
: elenca tutte le DLL caricate dai processi nel dump di memoria.handles
: elenca tutti i gestori di oggetti aperti dai processi nel dump di memoria.filescan
: esegue una scansione dei file nel dump di memoria.netscan
: esegue una scansione delle connessioni di rete nel dump di memoria.cmdline
: visualizza gli argomenti della riga di comando per i processi nel dump di memoria.malfind
: cerca indicatori di malware nel dump di memoria.apihooks
: elenca tutte le funzioni API modificate dai processi nel dump di memoria.
Questi sono solo alcuni dei comandi disponibili in Volatility. Puoi consultare la documentazione ufficiale di Volatility per ulteriori informazioni su come utilizzare questi comandi e altri strumenti disponibili.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
Riga di comando
È stato eseguito qualcosa di sospetto?
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> vadinfo -p <pid>
: This command displays information about the virtual address space for a specific process.volatility -f <memory_dump> vadtree -p <pid>
: This command displays the virtual address space tree for a specific process.volatility -f <memory_dump> memdump -p <pid> -D <output_directory>
: This command dumps the memory of a specific process to a file.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <registry_key>
: This command displays the contents of a specific registry key in the memory dump.volatility -f <memory_dump> dumpregistry -D <output_directory>
: This command dumps the entire registry from the memory dump to a file.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.
To use a plugin, simply append the plugin name to the Volatility command. For example:
volatility -f <memory_dump> timeliner
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
I comandi eseguiti in cmd.exe
sono gestiti da conhost.exe
(o csrss.exe
nei sistemi precedenti a Windows 7). Ciò significa che se cmd.exe
viene terminato da un attaccante prima di ottenere un dump di memoria, è comunque possibile recuperare la cronologia dei comandi della sessione dalla memoria di conhost.exe
. Per fare ciò, se viene rilevata un'attività insolita nei moduli della console, dovrebbe essere effettuato un dump della memoria del processo conhost.exe
associato. Successivamente, cercando stringhe all'interno di questo dump, è possibile estrarre potenzialmente le righe di comando utilizzate nella sessione.
Ambiente
Ottieni le variabili di ambiente di ogni processo in esecuzione. Potrebbero esserci alcuni valori interessanti.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
Privilegi del token
Controlla i token dei privilegi nei servizi inaspettati. Potrebbe essere interessante elencare i processi che utilizzano un token privilegiato.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
SIDs
Controlla ogni SSID posseduto da un processo. Potrebbe essere interessante elencare i processi che utilizzano un SID con privilegi (e i processi che utilizzano un SID di servizio).
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> vadinfo -p <pid>
: This command displays information about the virtual address space for a specific process.volatility -f <memory_dump> vadtree -p <pid>
: This command displays the virtual address space tree for a specific process.volatility -f <memory_dump> memdump -p <pid> -D <output_directory>
: This command dumps the memory of a specific process to a file.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <registry_key>
: This command displays the contents of a specific registry key in the memory dump.volatility -f <memory_dump> dumpregistry -D <output_directory>
: This command dumps the entire registry from the memory dump to a file.
Volatility Plugins
Volatility also supports plugins that provide additional functionality. To use a plugin, simply specify it with the -p
option followed by the plugin name. For example:
Some popular Volatility plugins include:
malfind
: Scans the memory dump for potentially malicious code.timeliner
: Extracts timeline information from the memory dump.dumpfiles
: Extracts files from the memory dump.hivelist
: Lists the registry hives in the memory dump.printkey
: Displays the contents of a specific registry key in the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis. By using the commands and plugins provided by Volatility, you can gain valuable insights into the memory dump and uncover potential security issues. Remember to always use Volatility responsibly and ethically.
Gestori
Utile sapere a quali altri file, chiavi, thread, processi... un processo ha un gestore (ha aperto)
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> vadinfo -p <pid>
: This command displays information about the virtual address space for a specific process.volatility -f <memory_dump> vadtree -p <pid>
: This command displays the virtual address space tree for a specific process.volatility -f <memory_dump> memdump -p <pid> -D <output_directory>
: This command dumps the memory of a specific process to a file.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <registry_key>
: This command displays the contents of a specific registry key in the memory dump.volatility -f <memory_dump> dumpregistry -D <output_directory>
: This command dumps the entire registry from the memory dump to a file.
Volatility Plugins
Volatility also supports plugins that provide additional functionality. To use a plugin, simply specify it with the -p
option followed by the plugin name. For example:
Some popular Volatility plugins include:
malfind
: Scans the memory dump for potentially malicious code.timeliner
: Extracts timeline information from the memory dump.dumpfiles
: Extracts files from the memory dump.hivelist
: Lists the registry hives in the memory dump.printkey
: Displays the contents of a specific registry key in the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis. By using the commands and plugins provided by Volatility, you can extract valuable information from memory dumps and perform in-depth forensic analysis.
DLLs
List loaded DLLs
Dump DLL
Find DLL by name
Find DLL by process
Find DLL by module
Find DLL by base address
Find DLL by size
Find DLL by path
Find DLL by timestamp
Find DLL by checksum
Find DLL by description
Find DLL by company
Find DLL by product
Find DLL by version
Find DLL by language
Find DLL by original filename
Find DLL by internal name
Find DLL by legal copyright
Find DLL by legal trademark
Find DLL by product version
Find DLL by file description
Find DLL by file version
Find DLL by comments
Find DLL by private build
Find DLL by special build
Find DLL by product name
Find DLL by file size
Find DLL by file path
Find DLL by file extension
Find DLL by file attributes
Find DLL by file creation time
Find DLL by file modification time
Find DLL by file access time
Find DLL by file change time
Find DLL by file attributes change time
Find DLL by file creation timestamp
Find DLL by file modification timestamp
Find DLL by file access timestamp
Find DLL by file change timestamp
Find DLL by file attributes change timestamp
Find DLL by file creation date
Find DLL by file modification date
Find DLL by file access date
Find DLL by file change date
Find DLL by file attributes change date
Find DLL by file creation datetime
Find DLL by file modification datetime
Find DLL by file access datetime
Find DLL by file change datetime
Find DLL by file attributes change datetime
Find DLL by file creation year
Find DLL by file modification year
Find DLL by file access year
Find DLL by file change year
Find DLL by file attributes change year
Find DLL by file creation month
Find DLL by file modification month
Find DLL by file access month
Find DLL by file change month
Find DLL by file attributes change month
Find DLL by file creation day
Find DLL by file modification day
Find DLL by file access day
Find DLL by file change day
Find DLL by file attributes change day
Find DLL by file creation hour
Find DLL by file modification hour
Find DLL by file access hour
Find DLL by file change hour
Find DLL by file attributes change hour
Find DLL by file creation minute
Find DLL by file modification minute
Find DLL by file access minute
Find DLL by file change minute
Find DLL by file attributes change minute
Find DLL by file creation second
Find DLL by file modification second
Find DLL by file access second
Find DLL by file change second
Find DLL by file attributes change second
Find DLL by file creation millisecond
Find DLL by file modification millisecond
Find DLL by file access millisecond
Find DLL by file change millisecond
Find DLL by file attributes change millisecond
Find DLL by file creation microsecond
Find DLL by file modification microsecond
Find DLL by file access microsecond
Find DLL by file change microsecond
Find DLL by file attributes change microsecond
Find DLL by file creation nanosecond
Find DLL by file modification nanosecond
Find DLL by file access nanosecond
Find DLL by file change nanosecond
Find DLL by file attributes change nanosecond
Find DLL by file creation timezone
Find DLL by file modification timezone
Find DLL by file access timezone
Find DLL by file change timezone
Find DLL by file attributes change timezone
Find DLL by file creation offset
Find DLL by file modification offset
Find DLL by file access offset
Find DLL by file change offset
Find DLL by file attributes change offset
Find DLL by file creation offset hours
Find DLL by file modification offset hours
Find DLL by file access offset hours
Find DLL by file change offset hours
Find DLL by file attributes change offset hours
Find DLL by file creation offset minutes
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> vadinfo -p <pid>
: This command displays information about the virtual address space for a specific process.volatility -f <memory_dump> vadtree -p <pid>
: This command displays the virtual address space tree for a specific process.volatility -f <memory_dump> memdump -p <pid> -D <output_directory>
: This command dumps the memory of a specific process to a file.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <registry_key>
: This command displays the contents of a specific registry key in the memory dump.volatility -f <memory_dump> dumpregistry -D <output_directory>
: This command dumps the registry hives in the memory dump to files.
Volatility Plugins
Volatility also supports plugins that provide additional functionality. To use a plugin, simply specify it with the -p
option followed by the plugin name. For example:
Some popular Volatility plugins include:
malfind
: Scans the memory dump for potentially malicious code.timeliner
: Extracts timeline information from the memory dump.dumpfiles
: Dumps files from the memory dump.hivelist
: Lists the registry hives in the memory dump.printkey
: Displays the contents of a specific registry key in the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis. By using the commands and plugins provided by Volatility, you can extract valuable information from memory dumps and perform in-depth forensic analysis.
Stringhe per processi
Volatility ci permette di verificare a quale processo appartiene una stringa.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
Inoltre, consente di cercare stringhe all'interno di un processo utilizzando il modulo yarascan:
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the following command to install Volatility:
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility imageinfo
: This command displays information about the memory image, such as the operating system version, architecture, and profile.volatility pslist
: This command lists all running processes in the memory image.volatility psscan
: This command scans for processes in the memory image.volatility pstree
: This command displays the process tree in the memory image.volatility dlllist
: This command lists all loaded DLLs in the memory image.volatility handles
: This command lists all open handles in the memory image.volatility filescan
: This command scans for file objects in the memory image.volatility cmdline
: This command displays the command-line arguments of processes in the memory image.volatility netscan
: This command scans for network connections in the memory image.volatility connections
: This command displays information about network connections in the memory image.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility malfind
: This command scans for injected code and malicious processes in the memory image.volatility apihooks
: This command displays information about API hooks in the memory image.volatility callbacks
: This command displays information about callback functions in the memory image.volatility modscan
: This command scans for kernel modules in the memory image.volatility svcscan
: This command scans for Windows services in the memory image.volatility driverirp
: This command displays information about driver IRPs in the memory image.volatility printkey
: This command displays the contents of a registry key in the memory image.volatility hivelist
: This command lists all registry hives in the memory image.volatility hashdump
: This command dumps the password hashes from the memory image.
Memory Analysis Tips
Here are some tips for conducting memory analysis using Volatility:
Always use the correct profile for the memory image. The profile specifies the operating system version and architecture.
Use multiple plugins to gather as much information as possible. Different plugins provide different insights into the memory image.
Compare the output of different plugins to cross-reference information and identify anomalies.
Use the
--output-file
option to save the output of a command to a file for further analysis.Use the
--profile
option to specify the profile for a specific command, if different from the default profile.
Additional Resources
Here are some additional resources for learning more about memory analysis and using Volatility:
Volatility official documentation: https://github.com/volatilityfoundation/volatility/wiki
Volatility cheat sheet: https://github.com/sans-dfir/sift-cheatsheet/blob/master/cheatsheets/volatility-cheatsheet.pdf
Volatility plugins repository: https://github.com/volatilityfoundation/community
Happy memory analysis with Volatility!
UserAssist
Windows tiene traccia dei programmi che esegui utilizzando una funzionalità nel registro chiamata chiavi UserAssist. Queste chiavi registrano quante volte ogni programma viene eseguito e quando è stato eseguito l'ultima volta.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for injected code or malware.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> printkey -K <registry_key>
: This command displays the values and subkeys of a specific registry key.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> hashdump -s <system_hive> -y <sam_hive>
: This command dumps the password hashes from the SAM database.
Volatility Plugins
Volatility also supports plugins that provide additional functionality. To use a plugin, you can use the -p
option followed by the plugin name. For example:
Some popular Volatility plugins include:
malfind
: Scans the memory dump for injected code or malware.timeliner
: Extracts timeline information from the memory dump.dumpfiles
: Dumps files from the memory dump.yarascan
: Scans the memory dump using YARA rules.vadinfo
: Displays information about the Virtual Address Descriptors (VADs) in the memory dump.
Volatility Profiles
Volatility uses profiles to determine the operating system and architecture of the memory dump. You can specify a profile using the -p
option followed by the profile name. For example:
Some common Volatility profiles include:
WinXPSP2x86
: Windows XP SP2 (32-bit)Win7SP1x64
: Windows 7 SP1 (64-bit)Win10x64
: Windows 10 (64-bit)
Conclusion
Volatility is a powerful tool for memory analysis. By using the commands and plugins provided by Volatility, you can extract valuable information from memory dumps and perform in-depth forensic analysis.
RootedCON è l'evento di sicurezza informatica più rilevante in Spagna e uno dei più importanti in Europa. Con la missione di promuovere la conoscenza tecnica, questo congresso è un punto di incontro vivace per i professionisti della tecnologia e della sicurezza informatica in ogni disciplina.
Servizi
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository.
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python vol.py
to verify that Volatility is installed correctly.
Basic Volatility Commands
imageinfo
: Displays information about the memory image.pslist
: Lists running processes.pstree
: Displays a process tree.dlllist
: Lists loaded DLLs.handles
: Lists open handles.cmdline
: Displays command line arguments.filescan
: Scans for file objects in memory.netscan
: Scans for network connections.connections
: Lists open network connections.malfind
: Finds hidden or injected code.dumpfiles
: Dumps files from memory.dumpregistry
: Dumps registry hives.hivelist
: Lists registry hives.hashdump
: Dumps password hashes.privs
: Lists process privileges.svcscan
: Scans for Windows services.modscan
: Scans for loaded kernel modules.ssdt
: Displays the System Service Descriptor Table.driverirp
: Lists IRP handlers for drivers.idt
: Displays the Interrupt Descriptor Table.gdt
: Displays the Global Descriptor Table.callbacks
: Lists registered callbacks.ssdt
: Displays the System Service Descriptor Table.driverirp
: Lists IRP handlers for drivers.idt
: Displays the Interrupt Descriptor Table.gdt
: Displays the Global Descriptor Table.callbacks
: Lists registered callbacks.
Memory Analysis Techniques
Process Analysis: Analyzing running processes to identify malicious activity or suspicious behavior.
DLL Analysis: Analyzing loaded DLLs to identify malicious or suspicious code.
Network Analysis: Analyzing network connections and traffic to identify malicious or suspicious activity.
File Analysis: Analyzing files in memory to identify malicious or suspicious files.
Registry Analysis: Analyzing registry hives to identify malicious or suspicious entries.
Malware Analysis: Analyzing malware artifacts in memory to understand their behavior and capabilities.
Memory Analysis Frameworks
Volatility: A popular open-source memory forensics framework.
Rekall: Another open-source memory forensics framework.
Mandiant Redline: A commercial memory forensics tool.
WinDbg: A Windows kernel debugger that can be used for memory analysis.
GDB: A GNU Project debugger that can be used for memory analysis on Linux systems.
Memory Analysis Tips
Always work on a copy of the memory image to avoid accidental modifications.
Use multiple memory analysis tools to cross-validate your findings.
Document your analysis process and findings to maintain a clear record.
Stay up-to-date with the latest memory analysis techniques and tools.
Join online communities and forums to learn from and collaborate with other memory analysts.
Additional Resources
References
Rete
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python vol.py
to verify that Volatility is installed correctly.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
imageinfo
: This command displays information about the memory image, such as the operating system version and architecture.pslist
: This command lists all running processes in the memory image.pstree
: This command displays the process tree, showing the parent-child relationships between processes.dlllist
: This command lists all loaded DLLs in the memory image.handles
: This command lists all open handles in the memory image.filescan
: This command scans the memory image for file artifacts, such as file headers and file names.dumpfiles
: This command extracts files from the memory image.malfind
: This command scans the memory image for common malware indicators.cmdscan
: This command scans the memory image for command-line artifacts, such as executed commands.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
mbrparser
: This command parses the Master Boot Record (MBR) from the memory image.ssdt
: This command displays the System Service Descriptor Table (SSDT) from the memory image.driverscan
: This command scans the memory image for loaded drivers.modscan
: This command scans the memory image for loaded kernel modules.vadinfo
: This command displays information about the Virtual Address Descriptors (VADs) in the memory image.vaddump
: This command dumps the memory contents of a specific VAD.vadtree
: This command displays the VAD tree, showing the hierarchical relationships between VADs.vadwalk
: This command walks the VAD tree and displays the memory regions mapped by each VAD.memmap
: This command displays the memory map of the memory image.
Volatility Plugins
Volatility also supports plugins, which provide additional functionality for memory analysis. Some popular plugins include:
malfind
: This plugin scans the memory image for common malware indicators.timeliner
: This plugin creates a timeline of events based on timestamps found in the memory image.apihooks
: This plugin displays information about API hooks in the memory image.svcscan
: This plugin scans the memory image for Windows services.netscan
: This plugin scans the memory image for network connections.psxview
: This plugin displays information about hidden processes in the memory image.
To use a plugin, simply run the command python vol.py -f <memory_image> --profile=<profile> <plugin_name>
. Replace <memory_image>
with the path to your memory image file, <profile>
with the appropriate profile for your memory image, and <plugin_name>
with the name of the plugin you want to use.
Conclusion
Volatility is a powerful tool for memory analysis, allowing you to extract valuable information from memory images. By using the basic and advanced commands, as well as the available plugins, you can perform in-depth analysis and gain insights into the activities and artifacts present in a memory image.
Happy analyzing!
Registro dell'alveare
Stampa alveari disponibili
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
Ottenere un valore
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the following command to install Volatility:
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility imageinfo
: This command displays information about the memory image, such as the operating system version, architecture, and profile.volatility pslist
: This command lists all running processes in the memory image.volatility psscan
: This command scans for processes in the memory image.volatility pstree
: This command displays the process tree in the memory image.volatility dlllist
: This command lists all loaded DLLs in the memory image.volatility handles
: This command lists all open handles in the memory image.volatility filescan
: This command scans for file objects in the memory image.volatility cmdline
: This command displays the command-line arguments of processes in the memory image.volatility netscan
: This command scans for network connections in the memory image.volatility connections
: This command displays information about network connections in the memory image.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility malfind
: This command scans for injected code and malicious processes in the memory image.volatility apihooks
: This command displays information about API hooks in the memory image.volatility callbacks
: This command displays information about callback functions in the memory image.volatility modscan
: This command scans for kernel modules in the memory image.volatility svcscan
: This command scans for Windows services in the memory image.volatility driverirp
: This command displays information about driver IRPs in the memory image.volatility printkey
: This command displays the contents of a registry key in the memory image.volatility hivelist
: This command lists all registry hives in the memory image.volatility hashdump
: This command dumps the password hashes from the memory image.
Memory Analysis Plugins
Volatility also provides a wide range of plugins for specific memory analysis tasks. Some popular plugins include:
volatility timeliner
: This plugin creates a timeline of events based on timestamps in the memory image.volatility dumpfiles
: This plugin extracts files from the memory image.volatility screenshot
: This plugin captures screenshots from the memory image.volatility vadinfo
: This plugin displays information about Virtual Address Descriptors (VADs) in the memory image.volatility memdump
: This plugin dumps the memory of a specific process in the memory image.
To use a plugin, simply run the following command:
Replace [plugin_name]
with the name of the plugin you want to use and [memory_image]
with the path to the memory image file.
Conclusion
Volatility is a powerful tool for memory analysis in forensic investigations. By using the various commands and plugins provided by Volatility, you can extract valuable information from memory images and gain insights into the activities and artifacts left behind by malicious actors.
Dump
Filesystem
Montaggio
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
Scansione/dump
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
Tabella dei file principali
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> vadinfo
: This command displays information about the Virtual Address Descriptors (VADs) in the memory dump.volatility -f <memory_dump> vadtree
: This command displays the VAD tree in the memory dump.volatility -f <memory_dump> vadwalk -p <pid>
: This command walks the VAD tree for a specific process.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> dumpfiles -Q <pid>
: This plugin extracts files from the memory dump for a specific process.volatility -f <memory_dump> screenshot
: This plugin captures screenshots of the desktop from the memory dump.volatility -f <memory_dump> hivelist
: This plugin lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <key_path>
: This plugin displays the values of a specific registry key in the memory dump.volatility -f <memory_dump> hashdump
: This plugin dumps the password hashes from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and gain insights into the system's state at the time of the memory dump.
Il sistema di file NTFS utilizza un componente critico noto come master file table (MFT). Questa tabella include almeno una voce per ogni file su un volume, coprendo anche l'MFT stesso. I dettagli vitali su ogni file, come dimensione, timestamp, autorizzazioni e dati effettivi, sono racchiusi nelle voci dell'MFT o in aree esterne all'MFT ma referenziate da queste voci. Ulteriori dettagli possono essere trovati nella documentazione ufficiale.
Chiavi/Certificati SSL
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository.
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python vol.py
to verify that Volatility is installed correctly.
Basic Volatility Commands
imageinfo
: Displays information about the memory image.pslist
: Lists running processes.pstree
: Displays a process tree.dlllist
: Lists loaded DLLs.handles
: Lists open handles.cmdline
: Displays command line arguments.filescan
: Scans for file objects in memory.netscan
: Scans for network connections.connections
: Lists open network connections.malfind
: Finds hidden or injected code.dumpfiles
: Dumps files from memory.dumpregistry
: Dumps registry hives.hivelist
: Lists registry hives.hashdump
: Dumps password hashes.privs
: Lists process privileges.svcscan
: Scans for Windows services.modscan
: Scans for loaded kernel modules.ssdt
: Displays the System Service Descriptor Table.driverirp
: Lists IRP handlers for drivers.idt
: Displays the Interrupt Descriptor Table.gdt
: Displays the Global Descriptor Table.callbacks
: Lists registered callbacks.ssdt
: Displays the System Service Descriptor Table.driverirp
: Lists IRP handlers for drivers.idt
: Displays the Interrupt Descriptor Table.gdt
: Displays the Global Descriptor Table.callbacks
: Lists registered callbacks.
Memory Analysis Techniques
Process Analysis: Analyzing running processes to identify malicious activity or suspicious behavior.
DLL Analysis: Analyzing loaded DLLs to identify malicious or suspicious code.
Network Analysis: Analyzing network connections and traffic to identify malicious or suspicious activity.
File Analysis: Analyzing files in memory to identify malicious or suspicious files.
Registry Analysis: Analyzing registry hives to identify malicious or suspicious entries.
Malware Analysis: Analyzing malware artifacts in memory to understand their behavior and capabilities.
Memory Analysis Frameworks
Volatility: A popular open-source memory forensics framework.
Rekall: Another open-source memory forensics framework.
Mandiant Redline: A commercial memory forensics tool.
WinDbg: A Windows kernel debugger that can be used for memory analysis.
GDB: A GNU Project debugger that can be used for memory analysis on Linux systems.
Memory Analysis Tips
Always work on a copy of the memory image to avoid accidental modifications.
Use multiple memory analysis tools to cross-validate your findings.
Document your analysis process and findings to maintain a clear record.
Stay up-to-date with the latest memory analysis techniques and tools.
Join online communities and forums to learn from and collaborate with other memory analysts.
Additional Resources
References
Malware
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the following command to install Volatility:
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility imageinfo
: This command displays information about the memory image, such as the operating system version, architecture, and profile.volatility pslist
: This command lists all running processes in the memory image.volatility psscan
: This command scans for processes in the memory image.volatility pstree
: This command displays the process tree in the memory image.volatility dlllist
: This command lists all loaded DLLs in the memory image.volatility handles
: This command lists all open handles in the memory image.volatility filescan
: This command scans for file objects in the memory image.volatility cmdline
: This command displays the command-line arguments of processes in the memory image.volatility netscan
: This command scans for network connections in the memory image.volatility connections
: This command displays information about network connections in the memory image.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility malfind
: This command scans for injected code and malicious processes in the memory image.volatility apihooks
: This command displays information about API hooks in the memory image.volatility callbacks
: This command displays information about callback functions in the memory image.volatility modscan
: This command scans for kernel modules in the memory image.volatility svcscan
: This command scans for Windows services in the memory image.volatility driverirp
: This command displays information about driver IRPs in the memory image.volatility printkey
: This command displays the contents of a registry key in the memory image.volatility hivelist
: This command lists all registry hives in the memory image.volatility hashdump
: This command dumps the password hashes from the memory image.
Memory Analysis Plugins
Volatility also provides a wide range of plugins for specific memory analysis tasks. Some popular plugins include:
volatility timeliner
: This plugin creates a timeline of events based on timestamps in the memory image.volatility dumpfiles
: This plugin extracts files from the memory image.volatility screenshot
: This plugin captures screenshots from the memory image.volatility vadinfo
: This plugin displays information about Virtual Address Descriptors (VADs) in the memory image.volatility memdump
: This plugin dumps the memory of a specific process in the memory image.
To use a plugin, simply run the following command:
Replace [plugin_name]
with the name of the plugin you want to use and [memory_image]
with the path to the memory image file.
Conclusion
Volatility is a powerful tool for memory analysis in forensic investigations. By using the various commands and plugins provided by Volatility, you can extract valuable information from memory images and gain insights into the activities and artifacts left behind by malicious actors.
Scansione con yara
Utilizza questo script per scaricare e unire tutte le regole di malware yara da github: https://gist.github.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9 Crea la directory rules ed esegui lo script. Questo creerà un file chiamato malware_rules.yar che contiene tutte le regole yara per il malware.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
MISC
Plugin esterni
Se desideri utilizzare plugin esterni, assicurati che le cartelle relative ai plugin siano il primo parametro utilizzato.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> driverirp
: This command displays the IRP hooks in the memory dump.volatility -f <memory_dump> ssdt
: This command displays the System Service Descriptor Table (SSDT) hooks in the memory dump.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <hive>
: This command displays the contents of a specific registry key.volatility -f <memory_dump> dumpregistry -K <hive> -D <output_directory>
: This command dumps the contents of a specific registry hive to a directory.
Volatility Plugins
Volatility also provides a wide range of plugins that can be used for specific analysis tasks. Some popular plugins include:
volatility -f <memory_dump> timeliner
: This plugin creates a timeline of events based on timestamps in the memory dump.volatility -f <memory_dump> mftparser
: This plugin parses the Master File Table (MFT) in the memory dump.volatility -f <memory_dump> shimcache
: This plugin extracts information from the Application Compatibility Cache (ShimCache) in the memory dump.volatility -f <memory_dump> iehistory
: This plugin extracts Internet Explorer browsing history from the memory dump.volatility -f <memory_dump> chromehistory
: This plugin extracts Google Chrome browsing history from the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory dumps. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
Autoruns
Scaricalo da https://github.com/tomchop/volatility-autoruns
Mutex
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for potentially malicious code.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> vadinfo -p <pid>
: This command displays information about the virtual address space for a specific process.volatility -f <memory_dump> vadtree -p <pid>
: This command displays the virtual address space tree for a specific process.volatility -f <memory_dump> memdump -p <pid> -D <output_directory>
: This command dumps the memory of a specific process to a file.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> printkey -K <registry_key>
: This command displays the contents of a specific registry key in the memory dump.volatility -f <memory_dump> dumpregistry -D <output_directory>
: This command dumps the entire registry from the memory dump to a file.
Volatility Plugins
Volatility also supports plugins that provide additional functionality. To use a plugin, simply specify it with the -p
option followed by the plugin name. For example:
Some popular Volatility plugins include:
malfind
: Scans the memory dump for potentially malicious code.timeliner
: Extracts timeline information from the memory dump.dumpfiles
: Extracts files from the memory dump.hivelist
: Lists the registry hives in the memory dump.printkey
: Displays the contents of a specific registry key in the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis. By using the commands and plugins provided by Volatility, you can extract valuable information from memory dumps and perform in-depth forensic analysis.
Collegamenti simbolici
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the following command to install Volatility:
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility imageinfo
: This command displays information about the memory image, such as the operating system version, architecture, and profile.volatility pslist
: This command lists all running processes in the memory image.volatility psscan
: This command scans for processes in the memory image.volatility pstree
: This command displays the process tree in the memory image.volatility dlllist
: This command lists all loaded DLLs in the memory image.volatility handles
: This command lists all open handles in the memory image.volatility filescan
: This command scans for file objects in the memory image.volatility cmdline
: This command displays the command-line arguments of processes in the memory image.volatility netscan
: This command scans for network connections in the memory image.volatility connections
: This command displays information about network connections in the memory image.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility malfind
: This command scans for injected code and malicious processes in the memory image.volatility apihooks
: This command displays information about API hooks in the memory image.volatility callbacks
: This command displays information about callback functions in the memory image.volatility modscan
: This command scans for kernel modules in the memory image.volatility svcscan
: This command scans for Windows services in the memory image.volatility driverirp
: This command displays information about driver IRPs in the memory image.volatility printkey
: This command displays the contents of a registry key in the memory image.volatility hivelist
: This command lists all registry hives in the memory image.volatility hashdump
: This command dumps the password hashes from the memory image.
Volatility Profiles
Volatility requires a profile to analyze a memory image. A profile defines the operating system and architecture of the memory image. You can find pre-built profiles for various operating systems in the volatility/plugins/overlays
directory.
To specify a profile, use the -p
or --profile
option followed by the profile name. For example:
Volatility Plugins
Volatility has a wide range of plugins that provide additional functionality for memory analysis. You can find a list of available plugins in the volatility/plugins
directory.
To use a plugin, specify the plugin name with the -f
or --plugin
option. For example:
Conclusion
Volatility is a powerful tool for memory analysis. By using the various commands and plugins available, you can extract valuable information from memory images and perform forensic analysis on compromised systems.
Bash
È possibile leggere dalla memoria la cronologia di bash. È anche possibile eseguire il dump del file .bash_history, ma se è stato disabilitato, sarai felice di poter utilizzare questo modulo di volatilità.
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the following command to install Volatility:
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility imageinfo
: This command displays information about the memory image, such as the operating system version, architecture, and profile.volatility pslist
: This command lists all running processes in the memory image.volatility psscan
: This command scans for processes in the memory image.volatility pstree
: This command displays the process tree in the memory image.volatility dlllist
: This command lists all loaded DLLs in the memory image.volatility handles
: This command lists all open handles in the memory image.volatility filescan
: This command scans for file objects in the memory image.volatility cmdline
: This command displays the command-line arguments of processes in the memory image.volatility netscan
: This command scans for network connections in the memory image.volatility connections
: This command displays information about network connections in the memory image.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility malfind
: This command scans for injected code and malicious processes in the memory image.volatility apihooks
: This command displays information about API hooks in the memory image.volatility callbacks
: This command displays information about callback functions in the memory image.volatility modscan
: This command scans for kernel modules in the memory image.volatility svcscan
: This command scans for Windows services in the memory image.volatility driverirp
: This command displays information about driver IRPs in the memory image.volatility printkey
: This command displays the contents of a registry key in the memory image.volatility hivelist
: This command lists all registry hives in the memory image.volatility hashdump
: This command dumps the password hashes from the memory image.
Memory Analysis Plugins
Volatility also provides a wide range of plugins for specific memory analysis tasks. Some popular plugins include:
volatility timeliner
: This plugin creates a timeline of events based on timestamps in the memory image.volatility dumpfiles
: This plugin extracts files from the memory image.volatility screenshot
: This plugin captures screenshots from the memory image.volatility vadinfo
: This plugin displays information about Virtual Address Descriptors (VADs) in the memory image.volatility memdump
: This plugin dumps the memory of a specific process in the memory image.
To use a plugin, simply run the following command:
Replace [plugin_name]
with the name of the plugin you want to use and [memory_image]
with the path to the memory image file.
Conclusion
Volatility is a powerful tool for memory analysis and forensic investigations. By using the commands and plugins provided by Volatility, you can extract valuable information from memory images and gain insights into the activities and behavior of a system.
Linea temporale
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python setup.py install
to install Volatility.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
volatility -f <memory_dump> imageinfo
: This command displays information about the memory dump file, such as the operating system version and architecture.volatility -f <memory_dump> pslist
: This command lists all running processes in the memory dump.volatility -f <memory_dump> psscan
: This command scans the memory dump for processes.volatility -f <memory_dump> pstree
: This command displays the process tree in the memory dump.volatility -f <memory_dump> dlllist -p <pid>
: This command lists the loaded DLLs for a specific process.volatility -f <memory_dump> cmdline -p <pid>
: This command displays the command line arguments for a specific process.volatility -f <memory_dump> filescan
: This command scans the memory dump for file objects.volatility -f <memory_dump> handles -p <pid>
: This command lists the open handles for a specific process.volatility -f <memory_dump> netscan
: This command scans the memory dump for network connections.volatility -f <memory_dump> connections
: This command displays the network connections in the memory dump.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
volatility -f <memory_dump> malfind
: This command scans the memory dump for injected code or malware.volatility -f <memory_dump> apihooks
: This command displays the API hooks in the memory dump.volatility -f <memory_dump> modscan
: This command scans the memory dump for loaded kernel modules.volatility -f <memory_dump> svcscan
: This command scans the memory dump for Windows services.volatility -f <memory_dump> printkey -K <registry_key>
: This command displays the values and subkeys of a specific registry key.volatility -f <memory_dump> hivelist
: This command lists the registry hives in the memory dump.volatility -f <memory_dump> hashdump -s <system_hive> -y <sam_hive>
: This command dumps the password hashes from the SAM database.
Volatility Plugins
Volatility also supports plugins that provide additional functionality. To use a plugin, you can use the -p
option followed by the plugin name. For example:
Here are some useful Volatility plugins:
malfind
: Scans the memory dump for injected code or malware.timeliner
: Extracts timeline information from the memory dump.dumpfiles
: Dumps files from the memory dump.cmdscan
: Scans the memory dump for command history.consoles
: Lists console history from the memory dump.vadinfo
: Displays information about the Virtual Address Descriptors (VADs) in the memory dump.
Conclusion
Volatility is a powerful tool for memory analysis. By using the commands and plugins provided by Volatility, you can extract valuable information from memory dumps and perform forensic analysis on compromised systems.
Driver
Volatility Cheat Sheet
Volatility Installation
To install Volatility, follow these steps:
Download the latest version of Volatility from the official GitHub repository: https://github.com/volatilityfoundation/volatility
Extract the downloaded file to a directory of your choice.
Open a terminal and navigate to the directory where you extracted Volatility.
Run the command
python vol.py
to verify that Volatility is installed correctly.
Basic Volatility Commands
Here are some basic Volatility commands that you can use for memory analysis:
imageinfo
: This command displays information about the memory image, such as the operating system version and architecture.pslist
: This command lists all running processes in the memory image.pstree
: This command displays the process tree, showing the parent-child relationships between processes.dlllist
: This command lists all loaded DLLs in the memory image.handles
: This command lists all open handles in the memory image.filescan
: This command scans the memory image for file artifacts, such as file headers and file names.dumpfiles
: This command extracts files from the memory image.malfind
: This command searches for malware in the memory image.cmdscan
: This command scans the memory image for command-line artifacts, such as executed commands.
Advanced Volatility Commands
Here are some advanced Volatility commands that you can use for more in-depth memory analysis:
mbrparser
: This command parses the Master Boot Record (MBR) in the memory image.ssdt
: This command displays the System Service Descriptor Table (SSDT) in the memory image.driverscan
: This command scans the memory image for loaded drivers.modscan
: This command scans the memory image for loaded kernel modules.ssdt
: This command displays the System Service Descriptor Table (SSDT) in the memory image.vadinfo
: This command displays information about the Virtual Address Descriptors (VADs) in the memory image.vaddump
: This command dumps the memory contents of a specific VAD.vadtree
: This command displays the VAD tree in the memory image.
Memory Analysis Plugins
Volatility also supports various plugins that can be used for specific memory analysis tasks. Some popular plugins include:
malfind
: This plugin searches for malware in the memory image.timeliner
: This plugin creates a timeline of events based on timestamps in the memory image.dumpregistry
: This plugin extracts the Windows registry from the memory image.hivelist
: This plugin lists the registry hives in the memory image.hashdump
: This plugin extracts password hashes from the memory image.netscan
: This plugin scans the memory image for network artifacts, such as open ports and network connections.
To use a plugin, simply run the command python vol.py -f <memory_image> --profile=<profile> <plugin_name>
. Replace <memory_image>
with the path to the memory image file, <profile>
with the appropriate profile for the memory image, and <plugin_name>
with the name of the plugin you want to use.
Conclusion
Volatility is a powerful tool for memory analysis and can be used to extract valuable information from memory images. By using the various commands and plugins available in Volatility, you can perform in-depth analysis and investigation of memory artifacts.
Ottenere la clipboard
Ottenere la cronologia di Internet Explorer
Questo comando consente di estrarre la cronologia di Internet Explorer da un dump di memoria utilizzando Volatility. Sostituisci <memory_dump>
con il percorso del dump di memoria e <profile>
con il profilo Volatility corretto per l'immagine di memoria.
Ottenere il testo di Notepad
Questo comando utilizza Volatility per estrarre il testo dal processo Notepad all'interno del dump di memoria "memory_dump.vmem" utilizzando il profilo "Win7SP1x64".
Screenshot
Master Boot Record (MBR)
Il Master Boot Record (MBR) è la prima sezione di un disco rigido o di un dispositivo di archiviazione che contiene le informazioni di avvio del sistema operativo. Questa area è critica per l'avvio del computer e contiene il codice di avvio e la tabella delle partizioni.
Analisi del MBR con Volatility
Volatility fornisce diversi plugin per l'analisi del MBR. Di seguito sono riportati alcuni dei plugin più comuni utilizzati per l'analisi del MBR:
mbrparser
: analizza il MBR e restituisce informazioni come la tabella delle partizioni, il codice di avvio e le firme.mbrscan
: esegue una scansione del MBR per rilevare eventuali modifiche o infezioni.mbrparser2
: analizza il MBR e restituisce informazioni dettagliate sulle partizioni, inclusi i tipi di file system e gli indirizzi di avvio.
Esempio di utilizzo di mbrparser
Questo comando analizza il MBR nel file di dump di memoria memory_dump.mem
utilizzando il plugin mbrparser
.
Esempio di utilizzo di mbrscan
Questo comando esegue una scansione del MBR nel file di dump di memoria memory_dump.mem
utilizzando il plugin mbrscan
.
Esempio di utilizzo di mbrparser2
Questo comando analizza il MBR nel file di dump di memoria memory_dump.mem
utilizzando il plugin mbrparser2
.
Il Master Boot Record (MBR) svolge un ruolo cruciale nella gestione delle partizioni logiche di un supporto di archiviazione, strutturate con diversi sistemi di file. Non solo contiene informazioni sulla disposizione delle partizioni, ma contiene anche codice eseguibile che funge da caricatore di avvio. Questo caricatore di avvio avvia direttamente il processo di caricamento del secondo stadio del sistema operativo (vedi second-stage boot loader) o funziona in armonia con il volume boot record (VBR) di ogni partizione. Per una conoscenza approfondita, consulta la pagina Wikipedia del MBR.
Riferimenti
RootedCON è l'evento sulla sicurezza informatica più rilevante in Spagna e uno dei più importanti in Europa. Con la missione di promuovere la conoscenza tecnica, questo congresso è un punto di incontro vivace per i professionisti della tecnologia e della sicurezza informatica in ogni disciplina.
Last updated