当前位置:网站首页>Volatility memory forensics - command shows
Volatility memory forensics - command shows
2022-07-30 06:38:00 【[email protected]】
Introduction: The proportion of forensic questions in ctf is getting bigger and bigger. As a new ctf entrant, I have forensic questions almost every time I play a few ctf games. The previous games were also helpless, and I finally calmed down and got seriousA problem has been reproduced.
Installation of Volatility
The previous old version of kali has its own volatility, so it can be used directly, but the current version basically needs to be downloaded and installed by itself, mainly depends on the python environment installation, requires some libraries, it is recommended to use python3
Download link: https://www.volatilityfoundation.org/releases
After downloading, go to the root directory and run vol.py directly!
Title link:https://buuoj.cn/match/matches/3/challenges
Command
1. Query mirror information
python vol.py -f mem.raw imageinfo2. View the mirroring process
python vol.py -f mem.raw --profile=Win7SP1x86 pslist You can view some suspicious processes here, there are three suspicious processes in this question
3. Example of dumping one of the processes
python vol.py -f mem.raw --profile=Win7SP1x86 memdump -p 3364 -D The process of dumping can be analyzed in detail
4. Check the dumped process for the existence of key, password, etc.
Example:
python vol.py -f mem.raw --profile=Win7SP1x86 pslist | find "mspaint.exe"5. Common process names of windows
TrueCrypt.exe Disk encryption tool notepad.exe Comes with notepad mspaint.exe Comes with drawing tool iexplore.exe IE browser DumpIt.exe Memory image extraction tool6. List the process table
python vol.py -f mem.raw --profile=Win7SP1x86 hivelist7. Extract registry information
python3 vol.py -f mem.raw --profile=Win7SP1x86 hivedump -o 0x82a9fb388. Get IE browser history
python vol.py -f mem.raw --profile=Win7SP1x86 iehistory9. List username and password
python vol.py -f mem.raw --profile=Win7SP1x86 printkey -K "SAM\Domains\Account\Users\Names"10. Get the username and password of the last logged-in user
python vol.py -f mem.raw --profile=Win7SP1x86 printkey -K "SOFTWARE\Microsoft\Windows Nt\CurrentVersion\Winlogon"11. View cmd command
python vol.py -f mem.raw --profile=Win7SP1x86 cmdscan12. View cmd details
python vol.py -f mem.raw --profile=Win7SP1x86 cmdline13. Copy, cut version
python vol.py -f mem.raw --profile=Win7SP1x86 clipboardpython vol.py -f mem.raw --profile=Win7SP1x86 dlllist -p 3820Note: If there are other commands in the future, it will continue to be updated
版权声明
本文为[[email protected]]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/211/202207300539173294.html
边栏推荐
- js 去除掉对象中的null,‘‘,[],{}
- 批量自动归集
- volatility内存取证----命令演示
- P3 元宝第五单元笔记
- [Mozhe Academy] Identity Authentication Failure Vulnerability Actual Combat
- CTF之misc-流量分析
- 3分钟告诉你如何成为一名黑客|零基础到黑客入门指南,你只需要掌握这五点能力
- 3 minutes to tell you how to become a hacker | Zero foundation to hacker introductory guide, you only need to master these five skills
- P3 元宝的笔记
- node手写服务器实现访问index页面
猜你喜欢
随机推荐
mysql不是内部或外部命令,也不是可运行的程序或批处理文件解决
P3 元宝第五单元笔记
umi后台项目导航自定义icon问题
awd——waf部署
【数仓】数据质量
[HCTF 2018]admin
【数仓】数据仓库高频面试题题英文版(1)
Defense Ideas for a Type of SMS Vulnerability
盲注、报错注入、宽字节注入、堆叠注入学习笔记
[HCTF 2018]admin
C# WPF下限制TextBox只输入数字、小数点、删除等键
C# WPF中监听窗口大小变化事件
CTF之misc-文件隐写
【文献阅读】Age Progress/Regression by Conditional Adversarial Autoencoder 基于条件对抗自编码器(CAAE)的老化/去龄化方案
CTFSHOW command execution [web29-web124] unfinished to be continued
FastAPI Quick Start
Redis简单了解
MongoDB快速入门与基本使用
oracle行转列、列转行总结
【问题解决】在写CSDN博客时,如何对段落进行首行缩进?







