当前位置:网站首页>Misc of CTF-Memory Analysis (Volatility)
Misc of CTF-Memory Analysis (Volatility)
2022-07-30 06:34:00 【[email protected]】
Introduction to Volatility:
Volatility is an open source, Python-based memory forensics toolset that can analyze various data in memory.Volatility supports the extraction and analysis of RAM data in 32-bit or 64-bit Windows, Linux, Mac, and Android operating systems.(High-level version of kali now needs to download Volatility by itself, which depends on python environment installation)
volatility use:
Begin preparation:
volatility -f
Get the parameters of --profile
Use the imageinfo plugin to guess the profile value of the dump file: WinXPSP2x8
[email protected]:~/quzhen# volatility -f mem.vmem imageinfo
List processes:
[email protected]:~/quzhen# volatility -f mem.vmem --profile=WinXPSP2x86 pslist
List registers cached in memory:
volatility -f mem.vmem --profile=WinXPSP2x86 hivelist
hivedump prints out the data in the registry:
volatility -f mem.vmem –profile=WinXPSP2x86 hivedump -o virtual address of the registry
Get users in SAM table:
volatility -f mem.vmem –profile=WinXPSP2x86 printkey -K “SAM\Domains\Account\Users\Names”
You can see there are four users in the picture below
Get the last login account:
volatility -f mem.vmem – profile=WinXPSP2x86 printkey -K “SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon”
Extract the information recorded in the memory about which programs are running at that time, how many times they have been run, and the last running time.
volatility -f mem.vmem – profile=WinXPSP2x86 userassist
dmp save a process data:
volatility -f mem.vmem –profile=WinXPSP2x86 -p [PID] -D [the directory where the dumped files are saved]
Extract cmd command usage retained in memory:
volatility -f mem.vmem –profile=WinXPSP2x86 cmdscan
Get the current network connection:
volatility -f mem.vmem --profile=WinXPSP2x86 netscan
Get the usage of IE browser:
volatility -f mem.vmem --profile=WinXPSP2x86 iehistory
Get the system password in memory (using hashdump to extract):
volatility -f mem.vmem –profile=WinXPSP2x86 hashdump -y 0xe1035b60 -s 0xe16aab60
Attached tool download address: https://github.com/volatilityfoundation
版权声明
本文为[[email protected]]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/211/202207300539173598.html
边栏推荐
猜你喜欢
随机推荐
【问题解决】在写CSDN博客时,如何对段落进行首行缩进?
Deserialization character escape
P3 元宝第三天的笔记
2022CISCNmisc
目前主流浏览器以及对应的内核
记一次Mailpress插件RCE漏洞复现
Koa2框架快速入门与基本使用
P3 元宝第五单元笔记
猜数字游戏
认识虚拟dom
VS2022中关于scanf函数报错解决方法
你怎么看待scanf()中%d的“吃空白”行为?
浏览器缓存
卷王的第一篇博客——编程学习的规划
社区版idea 最右侧没有Database怎么办
关于浅拷贝和深拷贝,草稿闲了写
MySQL数据库之JDBC编程
运维工程师面试经历
CTF misc-audio and video steganography
CTF之misc-日志分析








