当前位置:网站首页>Misc of CTF-Memory Analysis (Volatility)
Misc of CTF-Memory Analysis (Volatility)
2022-07-30 06:34:00 【[email protected]】
Introduction to Volatility:
Volatility is an open source, Python-based memory forensics toolset that can analyze various data in memory.Volatility supports the extraction and analysis of RAM data in 32-bit or 64-bit Windows, Linux, Mac, and Android operating systems.(High-level version of kali now needs to download Volatility by itself, which depends on python environment installation)
volatility use:
Begin preparation:
volatility -f
Get the parameters of --profile
Use the imageinfo plugin to guess the profile value of the dump file: WinXPSP2x8
[email protected]:~/quzhen# volatility -f mem.vmem imageinfo
List processes:
[email protected]:~/quzhen# volatility -f mem.vmem --profile=WinXPSP2x86 pslist
List registers cached in memory:
volatility -f mem.vmem --profile=WinXPSP2x86 hivelist
hivedump prints out the data in the registry:
volatility -f mem.vmem –profile=WinXPSP2x86 hivedump -o virtual address of the registry
Get users in SAM table:
volatility -f mem.vmem –profile=WinXPSP2x86 printkey -K “SAM\Domains\Account\Users\Names”
You can see there are four users in the picture below
Get the last login account:
volatility -f mem.vmem – profile=WinXPSP2x86 printkey -K “SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon”
Extract the information recorded in the memory about which programs are running at that time, how many times they have been run, and the last running time.
volatility -f mem.vmem – profile=WinXPSP2x86 userassist
dmp save a process data:
volatility -f mem.vmem –profile=WinXPSP2x86 -p [PID] -D [the directory where the dumped files are saved]
Extract cmd command usage retained in memory:
volatility -f mem.vmem –profile=WinXPSP2x86 cmdscan
Get the current network connection:
volatility -f mem.vmem --profile=WinXPSP2x86 netscan
Get the usage of IE browser:
volatility -f mem.vmem --profile=WinXPSP2x86 iehistory
Get the system password in memory (using hashdump to extract):
volatility -f mem.vmem –profile=WinXPSP2x86 hashdump -y 0xe1035b60 -s 0xe16aab60
Attached tool download address: https://github.com/volatilityfoundation
版权声明
本文为[[email protected]]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/211/202207300539173598.html
边栏推荐
猜你喜欢
随机推荐
【问题解决】在写CSDN博客时,如何对段落进行首行缩进?
C语言(入门篇一)
node包的导入与导出
Qt实现单击或双击QTableWidge/View表头进行排序
P3 元宝的笔记
封装Cookie API
三子棋游戏实现(c语言)
misc-file steganography of CTF
C#下大批量一键空投实现
Sql操作
uncategorized SQLException; SQL state [null]; error code [0]; sql injection violation, syntax error
P3 元宝序列化笔记
uni-app installs components using npm commands
uncategorized SQLException; SQL state [null]; error code [0]; sql injection violation, syntax error
EOF的用法——while(scanf(“%d“,&num)!=EOF)
运算符和交互基础
js 实现自定义签名
uni-app: about custom components, easycom specs, uni_modules, etc.
Dcat Admin 安装
Misc of CTF - other types of steganography