当前位置:网站首页>Secondary vocational group network security - memory Forensics
Secondary vocational group network security - memory Forensics
2022-07-04 04:55:00 【Beluga】
volatility -f test2.raw imageinfo
Get image details profile Parameters are important It will be used later
volatility -f test2.raw --profile=Win7SP1x64 hashdump
Get mirrored hash Value and user name After obtaining, you can use john Tools for dictionary decryption Or use ophcrack Crack
If there is mimikatz plug-in unit You can use it directly mimikatz To crack Direct password
The other is lsadump Can come out intermittent password It's not complete
volatility -f test2.raw --profile=Win7SP1x64 netscan Check the network connection
A lot of information will come out here ip According to the open port, we judge that 10.30.21.96 Go to the virtual machine to detect So it is
volatility -f test2.raw --profile=Win7SP1x64 envars | grep USERNAME
You can view the host name , Be careful to remove the back $ Symbol
obtain flag Document ideas :
1. Get the desktop file name , Guess its content
volatility -f test2.raw --profile=Win7SP1x64 filescan | grep Desktop
You can see the files on the desktop But can't read its contents
2. Maybe the desktop opens a notepad Program Use notepad You can see
volatility -f test2.raw --profile=Win7SP1x64 notepad
Mining process ideas :
1. First find the process with abnormal name such as Explore.exe The original system process is explorer.exe
2. In the case of Wei Guo in the previous way, the start time of the monitoring system process Judging from the starting time
3. Anyway, only the port and ip, Find external ip Try one by one
volatility -f test2.raw --profile=Win7SP1x64 netscan/connscan
volatility -f test2.raw --profile=Win7SP1x64 svcscan
volatility -f test2.raw --profile=Win7SP1x64 hivelist
Get browser history
volatility -f test2.raw iehistory
I'll give you one url From the parameters inside, you can see what has been searched
边栏推荐
- Solve the problem of failed to load property source from location 'classpathapplication YML 'problem
- 附件二:攻防演练保密协议.docx
- 6-4 vulnerability exploitation SSH banner information acquisition
- 抓包整理外篇fiddler———— 会话栏与过滤器
- 【MATLAB】MATLAB 仿真数字基带传输系统 — 数字基带传输系统
- Can closed data be deleted by DBCA? can
- 20000 words will take you to master multithreading
- 【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(第 I 类部分响应波形)的眼图
- VSCode的有用插件
- ADB tools
猜你喜欢
随机推荐
【无标题】
Drozer tool
Qt QTableView数据列宽度自适应
Kivy教程之 更改背景颜色(教程含源码)
[security attack and Defense] how much do you know about serialization and deserialization?
Acwing game 58
电子元器件商城与数据手册下载网站汇总
Definition of DCDC power supply current
【MATLAB】MATLAB 仿真模拟调制系统 — FM 系统
QT qtableview data column width adaptation
[Yugong series] go teaching course 001 in July 2022 - Introduction to go language premise
Utiliser des unités de mesure dans votre code pour une vie meilleure
appliedzkp zkevm(11)中的EVM Proof
Flutter 调用高德地图APP实现位置搜索、路线规划、逆地理编码
1. Mx6u-alpha development board (LED drive experiment in C language version)
Y55. Chapter III kubernetes from entry to proficiency -- HPA controller and metrics server (28)
【MATLAB】MATLAB 仿真模拟调制系统 — AM 已调信号的功率谱与相干解调
(pointer) write function void fun (int x, int *pp, int *n)
【Go】数据库框架gorm
附件五:攻击过程简报.docx