内存取证
volatility
https://blog.csdn.net/m0_68012373/article/details/127419463
https://blog.csdn.net/zjjcxy_long/article/details/108315214
vol2
与python对应
https://github.com/volatilityfoundation/volatility.git
- git clone之后cd volatility
- sudo python2 setup.py install
- pip2 install pycryptodome
- pip2 install distorm3
vol.py -f 1.raw imageinfo#获取镜像详细信息
vol.py -f 1.raw –profile=Win7SP1x64 pslist#查看进程
vol.py -f 1.raw –profile=Win7SP1x64 psscan#查看进程且能检测到隐藏或者解链的进程
#提取进程
vol.py -f 1.raw –profile=Win7SP1x64 memdump -n iexplore.exe -D ./#导出为dmp
vol.py -f 1.vmem –profile=Win7SP1x64 procdump -n iexplore.exe -D ./#导出为exe
vol.py -f 1.vmem –profile=Win7SP1x64 dlldump -n iexplore.exe -D ./#将进程的所有dll导出
vol.py -f 1.vmem –profile=Win7SP1x64 dumpregistry -D ./#提取注册表数据
vol.py –plugins volatility/plugins/ -f 1.raw –profile=Win7SP1x64 mimikatz#获取密码,也可能是clipboard
vol.py -f 1.vmem –profile=Win7SP1x64 iehistory#查看浏览器历史记录
vol.py -f 1.raw –profile=Win7SP0x64 dumpfiles -Q 0x000000001e742dd0 -D ./#根据编号提取文件
vol.py -f 1.raw –profile=Win7SP1x64 envars | grep ‘FLAG’#查看环境变量
vol.py -f 1.raw –profile=Win7SP1x64 hivelist#查看当前内存中装载的注册表
vol.py -f 1.raw –profile=Win7SP1x64 hivedump -o 0xfffff8a00148a420 #dump某个内存地址中的注册表
cat mem.vmem | strings | grep “flag”#查找字符串flag