当前位置:网站首页>Secondary vocational group network security - memory Forensics
Secondary vocational group network security - memory Forensics
2022-07-04 04:55:00 【Beluga】
volatility -f test2.raw imageinfo
Get image details profile Parameters are important It will be used later

volatility -f test2.raw --profile=Win7SP1x64 hashdump
Get mirrored hash Value and user name After obtaining, you can use john Tools for dictionary decryption Or use ophcrack Crack

If there is mimikatz plug-in unit You can use it directly mimikatz To crack Direct password
The other is lsadump Can come out intermittent password It's not complete
volatility -f test2.raw --profile=Win7SP1x64 netscan Check the network connection

A lot of information will come out here ip According to the open port, we judge that 10.30.21.96 Go to the virtual machine to detect So it is
volatility -f test2.raw --profile=Win7SP1x64 envars | grep USERNAME

You can view the host name , Be careful to remove the back $ Symbol
obtain flag Document ideas :
1. Get the desktop file name , Guess its content
volatility -f test2.raw --profile=Win7SP1x64 filescan | grep Desktop

You can see the files on the desktop But can't read its contents
2. Maybe the desktop opens a notepad Program Use notepad You can see
volatility -f test2.raw --profile=Win7SP1x64 notepad
Mining process ideas :
1. First find the process with abnormal name such as Explore.exe The original system process is explorer.exe
2. In the case of Wei Guo in the previous way, the start time of the monitoring system process Judging from the starting time
3. Anyway, only the port and ip, Find external ip Try one by one
volatility -f test2.raw --profile=Win7SP1x64 netscan/connscan
volatility -f test2.raw --profile=Win7SP1x64 svcscan
volatility -f test2.raw --profile=Win7SP1x64 hivelist
Get browser history
volatility -f test2.raw iehistory
I'll give you one url From the parameters inside, you can see what has been searched
边栏推荐
- Many founders of technology companies provided enterpriser first with a round C financing of up to US $158million to help it invest in the next generation of global innovators
- Talking about JVM
- Technology Management - learning / practice
- 【MATLAB】MATLAB 仿真数字带通传输系统 — ASK、 PSK、 FSK 系统
- RAC delete damaged disk group
- 简单g++和gdb调试
- 牛客小白月赛49
- 【MATLAB】通信信号调制通用函数 — 插值函数
- Kivy教程之 更改背景颜色(教程含源码)
- Qt QTableView数据列宽度自适应
猜你喜欢

附件六:防守工作簡報.docx

Exploration and practice of eventbridge in the field of SaaS enterprise integration

Can closed data be deleted by DBCA? can

Change the background color of Kivy tutorial (tutorial includes source code)

Use units of measure in your code for a better life

Maui introductory tutorial series (5.xaml and page introduction)

PostgreSQL 正式超越 MySQL,这家伙也太强了吧!

2022年6月总结

Developing mqtt access program under QT

Drozer tool
随机推荐
【MATLAB】MATLAB 仿真模拟调制系统 — FM 系统
LeetCode136+128+152+148
Flutter ‘/usr/lib/libswiftCore.dylib‘ (no such file)
The paddlehub face recognition scheme is deployed, and the trained model is deployed and applied in pytchrom
RAC delete damaged disk group
Distributed cap theory
【MATLAB】MATLAB 仿真模拟调制系统 — AM 已调信号的功率谱与相干解调
【MATLAB】通信信号调制通用函数 — 低通滤波器
Annex I: power of attorney for 202x XXX attack and defense drill
海力士EMMC5.0及5.1系列对比详解
[security attack and Defense] how much do you know about serialization and deserialization?
附件五:攻击过程简报.docx
Utiliser des unités de mesure dans votre code pour une vie meilleure
1. Mx6u-alpha development board (LED drive experiment in C language version)
软件设计文档示例模板 - 学习/实践
Definition of DCDC power supply current
【MATLAB】通信信号调制通用函数 — 窄带高斯白噪声的生成
通过dd创建asm disk
每日刷题记录 (十二)
Kivy教程之 07 组件和属性绑定实现按钮button点击修改label组件(教程含源码)