Volatility - CheatSheet
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã
â
ã¡ã¢ãªåæãèªååããç°ãªãã¹ãã£ã³ã¬ãã«ã§è€æ°ã®Volatility3ãã©ã°ã€ã³ã䞊è¡ããŠå®è¡ããããŒã«ãå¿ èŠãªå Žåã¯ãautoVolatility3ã䜿çšã§ããŸã:: https://github.com/H3xKatana/autoVolatility3/
# Full scan (runs all plugins)
python3 autovol3.py -f MEMFILE -o OUT_DIR -s full
# Minimal scan (runs a limited set of plugins)
python3 autovol3.py -f MEMFILE -o OUT_DIR -s minimal
# Normal scan (runs a balanced set of plugins)
python3 autovol3.py -f MEMFILE -o OUT_DIR -s normal
ããéããŠã¯ã¬ã€ãžãŒãªãã®ã欲ãããªããããã€ãã®Volatilityãã©ã°ã€ã³ã䞊è¡ããŠèµ·åããããã«æ¬¡ã䜿çšã§ããŸã: https://github.com/carlospolop/autoVolatility
python autoVolatility.py -f MEMFILE -d OUT_DIRECTORY -e /home/user/tools/volatility/vol.py # It will use the most important plugins (could use a lot of space depending on the size of the memory)
ã€ã³ã¹ããŒã«
volatility3
git clone https://github.com/volatilityfoundation/volatility3.git
cd volatility3
python3 setup.py install
python3 vol.py âh
volatility2
Download the executable from https://www.volatilityfoundation.org/26
Volatility ã³ãã³ã
å ¬åŒããã¥ã¡ã³ã㯠Volatility command reference ã§ã¢ã¯ã»ã¹ã§ããŸãã
âlistâ ãã©ã°ã€ã³ãš âscanâ ãã©ã°ã€ã³ã«ã€ããŠã®æ³šæ
Volatility ã«ã¯ãã©ã°ã€ã³ã«å¯Ÿãã2ã€ã®äž»èŠãªã¢ãããŒãããããããã¯æã
ãã®ååã«åæ ãããŸããâlistâ ãã©ã°ã€ã³ã¯ãããã»ã¹ïŒã¡ã¢ãªå
ã® _EPROCESS æ§é ã®ãªã³ã¯ãªã¹ããèŠã€ããŠæ©ãïŒã OS ãã³ãã«ïŒãã³ãã«ããŒãã«ãèŠã€ããŠãªã¹ãåããèŠã€ãã£ããã€ã³ã¿ãè§£åç
§ãããªã©ïŒã®æ
å ±ãååŸããããã« Windows ã«ãŒãã«æ§é ãããã²ãŒãããããšããŸãããããã¯ãäŸãã°ããã»ã¹ããªã¹ãåããããã«èŠæ±ãããå ŽåãWindows API ã®ããã«æ¯ãèããŸãã
ãã®ãããâlistâ ãã©ã°ã€ã³ã¯éåžžã«éãã§ããããã«ãŠã§ã¢ã«ããæäœã«å¯Ÿã㊠Windows API ãšåæ§ã«è匱ã§ããäŸãã°ããã«ãŠã§ã¢ã DKOM ã䜿çšããŠããã»ã¹ã _EPROCESS ãªã³ã¯ãªã¹ãããåãé¢ããšãã¿ã¹ã¯ãããŒãžã£ãŒã«ã pslist ã«ã衚瀺ãããŸããã
äžæ¹ãâscanâ ãã©ã°ã€ã³ã¯ãç¹å®ã®æ§é ãšããŠè§£åç
§ããããšãã«æå³ãæã€å¯èœæ§ã®ãããã®ãã¡ã¢ãªãã圫ãåºãã¢ãããŒããåããŸããäŸãã° psscan ã¯ã¡ã¢ãªãèªã¿åãããããã _EPROCESS ãªããžã§ã¯ããäœæããããšããŸãïŒããã¯ãé¢å¿ã®ããæ§é ã®ååšã瀺ã4ãã€ãã®æååãæ€çŽ¢ããããŒã«ã¿ã°ã¹ãã£ã³ã䜿çšããŸãïŒãå©ç¹ã¯ãçµäºããããã»ã¹ãæãèµ·ããããšãã§ãããã«ãŠã§ã¢ã _EPROCESS ãªã³ã¯ãªã¹ããæ¹ããããŠãããã©ã°ã€ã³ã¯ã¡ã¢ãªå
ã«æ®ã£ãŠããæ§é ãèŠã€ããããšãã§ããããšã§ãïŒããã»ã¹ãå®è¡ãããããã«ã¯ãæ§é ããŸã ååšããå¿
èŠããããŸãïŒãæ¬ ç¹ã¯ãâscanâ ãã©ã°ã€ã³ã¯ âlistâ ãã©ã°ã€ã³ãããå°ãé
ããæã«ã¯èª€æ€ç¥ãåŒãèµ·ããããšãããããšã§ãïŒçµäºããŠããé·ãæéãçµéããä»ã®æäœã«ãã£ãŠãã®æ§é ã®äžéšãäžæžããããããã»ã¹ïŒã
åºå ž: http://tomchop.me/2016/11/21/tutorial-volatility-plugins-malware-analysis/
OS ãããã¡ã€ã«
Volatility3
readme å
ã§èª¬æãããŠããããã«ããµããŒãããã OS ã® ã·ã³ãã«ããŒãã« ã volatility3/volatility/symbols å
ã«çœ®ãå¿
èŠããããŸãã
ããŸããŸãªãªãã¬ãŒãã£ã³ã°ã·ã¹ãã çšã®ã·ã³ãã«ããŒãã«ããã¯ã¯ ããŠã³ããŒã å¯èœã§ã:
- https://downloads.volatilityfoundation.org/volatility3/symbols/windows.zip
- https://downloads.volatilityfoundation.org/volatility3/symbols/mac.zip
- https://downloads.volatilityfoundation.org/volatility3/symbols/linux.zip
Volatility2
å€éšãããã¡ã€ã«
ãµããŒããããŠãããããã¡ã€ã«ã®ãªã¹ããååŸããã«ã¯ã次ã®ããã«ããŸã:
./volatility_2.6_lin64_standalone --info | grep "Profile"
æ°ããããŠã³ããŒããããããã¡ã€ã«ïŒäŸãã°ãLinuxçšã®ãã®ïŒã䜿çšãããå Žåã¯ã次ã®ãã©ã«ããŒæ§é ãã©ããã«äœæããå¿ èŠããããŸã: plugins/overlays/linux ãããŠããã®ãã©ã«ããŒã®äžã«ãããã¡ã€ã«ãå«ãzipãã¡ã€ã«ã眮ããŸããæ¬¡ã«ã次ã®ã³ãã³ãã䜿çšããŠãããã¡ã€ã«ã®çªå·ãååŸããŸã:
./vol --plugins=/home/kali/Desktop/ctfs/final/plugins --info
Volatility Foundation Volatility Framework 2.6
Profiles
--------
LinuxCentOS7_3_10_0-123_el7_x86_64_profilex64 - A Profile for Linux CentOS7_3.10.0-123.el7.x86_64_profile x64
VistaSP0x64 - A Profile for Windows Vista SP0 x64
VistaSP0x86 - A Profile for Windows Vista SP0 x86
Linuxããã³Macã®ãããã¡ã€ã«ã¯https://github.com/volatilityfoundation/profilesããããŠã³ããŒãã§ããŸãã
åã®éšåã§ã¯ããããã¡ã€ã«ãLinuxCentOS7_3_10_0-123_el7_x86_64_profilex64ãšåŒã°ããŠããã®ãèŠããããã䜿çšããŠæ¬¡ã®ãããªã³ãã³ããå®è¡ã§ããŸã:
./vol -f file.dmp --plugins=. --profile=LinuxCentOS7_3_10_0-123_el7_x86_64_profilex64 linux_netscan
ãããã¡ã€ã«ã®çºèŠ
volatility imageinfo -f file.dmp
volatility kdbgscan -f file.dmp
imageinfoãškdbgscanã®éã
ãã¡ããã: imageinfoãåã«ãããã¡ã€ã«ã®ææ¡ãæäŸããã®ã«å¯Ÿããkdbgscanã¯æ£ãããããã¡ã€ã«ãšæ£ããKDBGã¢ãã¬ã¹ïŒè€æ°ããå ŽåïŒãæ£ç¢ºã«ç¹å®ããããã«èšèšãããŠããŸãããã®ãã©ã°ã€ã³ã¯ãVolatilityãããã¡ã€ã«ã«é¢é£ããKDBGHeaderã·ã°ããã£ãã¹ãã£ã³ããåœéœæ§ãæžããããã®ãµããã£ãã§ãã¯ãé©çšããŸããåºåã®è©³çŽ°åºŠãšå®è¡ã§ãããµããã£ãã§ãã¯ã®æ°ã¯ãVolatilityãDTBãèŠã€ãããããã©ããã«äŸåãããããæ£ãããããã¡ã€ã«ããã§ã«ç¥ã£ãŠããå ŽåïŒãŸãã¯imageinfoãããããã¡ã€ã«ã®ææ¡ãåããŠããå ŽåïŒã¯ãããã䜿çšããããšã確èªããŠãã ããã
åžžã«kdbgscanãèŠã€ããããã»ã¹ã®æ°ã確èªããŠãã ãããæã ãimageinfoãškdbgscanã¯è€æ°ã®é©åãªãããã¡ã€ã«ãèŠã€ããããšããããŸãããæå¹ãªãã®ã ããããã€ãã®ããã»ã¹ã«é¢é£ããŠããããšã«ãªããŸãïŒããã¯ãããã»ã¹ãæœåºããããã«ã¯æ£ããKDBGã¢ãã¬ã¹ãå¿ èŠã ããã§ãïŒã
# GOOD
PsActiveProcessHead : 0xfffff800011977f0 (37 processes)
PsLoadedModuleList : 0xfffff8000119aae0 (116 modules)
# BAD
PsActiveProcessHead : 0xfffff800011947f0 (0 processes)
PsLoadedModuleList : 0xfffff80001197ac0 (0 modules)
KDBG
ã«ãŒãã«ãããã¬ãŒãããã¯ïŒKDBGïŒã¯ãVolatilityã«ãã£ãŠKDBGãšåŒã°ããVolatilityãããŸããŸãªãããã¬ãŒã«ãã£ãŠå®è¡ããããã©ã¬ã³ãžãã¯ã¿ã¹ã¯ã«ãšã£ãŠéèŠã§ããKdDebuggerDataBlockãšããŠç¹å®ãããã¿ã€ãã¯_KDDEBUGGER_DATA64ã§ãããPsActiveProcessHeadã®ãããªéèŠãªåç
§ãå«ãã§ããŸãããã®ç¹å®ã®åç
§ã¯ããã»ã¹ãªã¹ãã®å
é ãæãããã¹ãŠã®ããã»ã¹ã®ãªã¹ããå¯èœã«ãã培åºçãªã¡ã¢ãªåæã«ãšã£ãŠåºæ¬çã§ãã
OSæ å ±
#vol3 has a plugin to give OS information (note that imageinfo from vol2 will give you OS info)
./vol.py -f file.dmp windows.info.Info
ãã©ã°ã€ã³ banners.Banners ã¯ãvol3 ã§ãã³ãå
ã® Linux ãããŒãæ¢ãããã«äœ¿çšã§ããŸãã
ããã·ã¥/ãã¹ã¯ãŒã
SAM ããã·ã¥ããã¡ã€ã³ãã£ãã·ã¥è³æ Œæ å ± ããã³ lsa ã·ãŒã¯ã¬ãã ãæœåºããŸãã
./vol.py -f file.dmp windows.hashdump.Hashdump #Grab common windows hashes (SAM+SYSTEM)
./vol.py -f file.dmp windows.cachedump.Cachedump #Grab domain cache hashes inside the registry
./vol.py -f file.dmp windows.lsadump.Lsadump #Grab lsa secrets
ã¡ã¢ãªãã³ã
ããã»ã¹ã®ã¡ã¢ãªãã³ãã¯ãããã»ã¹ã®çŸåšã®ç¶æ ã®ãã¹ãŠãæœåºããŸããprocdumpã¢ãžã¥ãŒã«ã¯ã³ãŒãã®ã¿ãæœåºããŸãã
volatility -f file.dmp --profile=Win7SP1x86 memdump -p 2168 -D conhost/
ããã»ã¹
ããã»ã¹ã®ãªã¹ã
çãããããã»ã¹ïŒååã§ïŒãäºæããªãåããã»ã¹ïŒäŸãã°ãiexplorer.exeã®åãšããŠã®cmd.exeïŒãèŠã€ããããã«ããŠãã ããã
é ããããã»ã¹ãç¹å®ããããã«ãpslistã®çµæãpsscanã®çµæãšæ¯èŒããããšãè峿·±ããããããŸããã
python3 vol.py -f file.dmp windows.pstree.PsTree # Get processes tree (not hidden)
python3 vol.py -f file.dmp windows.pslist.PsList # Get process list (EPROCESS)
python3 vol.py -f file.dmp windows.psscan.PsScan # Get hidden process list(malware)
ããã»ã¹ãã³ã
./vol.py -f file.dmp windows.dumpfiles.DumpFiles --pid <pid> #Dump the .exe and dlls of the process in the current directory
ã³ãã³ãã©ã€ã³
çããããã®ã¯å®è¡ãããŸãããïŒ
python3 vol.py -f file.dmp windows.cmdline.CmdLine #Display process command-line arguments
cmd.exeã§å®è¡ãããã³ãã³ãã¯ãconhost.exeïŒãŸãã¯Windows 7以åã®ã·ã¹ãã ã§ã¯csrss.exeïŒã«ãã£ãŠç®¡çãããŸããããã¯ãæ»æè
ã«ãã£ãŠ**cmd.exeãçµäºãããå Žåã§ããã¡ã¢ãªãã³ããååŸãããåã«ãconhost.exeã®ã¡ã¢ãªããã»ãã·ã§ã³ã®ã³ãã³ãå±¥æŽãå埩ããããšãå¯èœã§ããããšãæå³ããŸãããããè¡ãã«ã¯ãã³ã³ãœãŒã«ã®ã¢ãžã¥ãŒã«å
ã§ç°åžžãªæŽ»åãæ€åºãããå Žåãé¢é£ããconhost.exeããã»ã¹ã®ã¡ã¢ãªããã³ãããå¿
èŠããããŸãããã®åŸããã®ãã³ãå
ã§strings**ãæ€çŽ¢ããããšã«ãããã»ãã·ã§ã³ã§äœ¿çšãããã³ãã³ãã©ã€ã³ãæœåºã§ããå¯èœæ§ããããŸãã
ç°å¢
åå®è¡äžããã»ã¹ã®ç°å¢å€æ°ãååŸããŸããè峿·±ãå€ããããããããŸããã
python3 vol.py -f file.dmp windows.envars.Envars [--pid <pid>] #Display process environment variables
ããŒã¯ã³ã®ç¹æš©
äºæããªããµãŒãã¹ã§ç¹æš©ããŒã¯ã³ã確èªããŸãã
ç¹æš©ããŒã¯ã³ã䜿çšããŠããããã»ã¹ããªã¹ãã¢ããããããšã¯è峿·±ããããããŸããã
#Get enabled privileges of some processes
python3 vol.py -f file.dmp windows.privileges.Privs [--pid <pid>]
#Get all processes with interesting privileges
python3 vol.py -f file.dmp windows.privileges.Privs | grep "SeImpersonatePrivilege\|SeAssignPrimaryPrivilege\|SeTcbPrivilege\|SeBackupPrivilege\|SeRestorePrivilege\|SeCreateTokenPrivilege\|SeLoadDriverPrivilege\|SeTakeOwnershipPrivilege\|SeDebugPrivilege"
SIDs
ããã»ã¹ãææããåSSIDã確èªããŸãã
ç¹æš©SIDã䜿çšããŠããããã»ã¹ïŒããã³ããã€ãã®ãµãŒãã¹SIDã䜿çšããŠããããã»ã¹ïŒããªã¹ãã¢ããããããšã¯è峿·±ããããããŸããã
./vol.py -f file.dmp windows.getsids.GetSIDs [--pid <pid>] #Get SIDs of processes
./vol.py -f file.dmp windows.getservicesids.GetServiceSIDs #Get the SID of services
ãã³ãã«
ããã»ã¹ããã³ãã«ãæã£ãŠããïŒãªãŒãã³ããŠããïŒä»ã®ãã¡ã€ã«ãããŒãã¹ã¬ãããããã»ã¹ãªã©ãç¥ãã®ã«åœ¹ç«ã¡ãŸãã
vol.py -f file.dmp windows.handles.Handles [--pid <pid>]
DLLs
./vol.py -f file.dmp windows.dlllist.DllList [--pid <pid>] #List dlls used by each
./vol.py -f file.dmp windows.dumpfiles.DumpFiles --pid <pid> #Dump the .exe and dlls of the process in the current directory process
ããã»ã¹ããšã®æåå
Volatilityã䜿çšãããšãæååãã©ã®ããã»ã¹ã«å±ããŠãããã確èªã§ããŸãã
strings file.dmp > /tmp/strings.txt
./vol.py -f /tmp/file.dmp windows.strings.Strings --strings-file /tmp/strings.txt
ããã»ã¹å ã®æååãæ€çŽ¢ããããã«ãyarascanã¢ãžã¥ãŒã«ã䜿çšããããšãã§ããŸãïŒ
./vol.py -f file.dmp windows.vadyarascan.VadYaraScan --yara-rules "https://" --pid 3692 3840 3976 3312 3084 2784
./vol.py -f file.dmp yarascan.YaraScan --yara-rules "https://"
UserAssist
Windowsã¯ãUserAssist keysãšåŒã°ããã¬ãžã¹ããªã®æ©èœã䜿çšããŠãå®è¡ããããã°ã©ã ã远跡ããŸãããããã®ããŒã¯ãåããã°ã©ã ãå®è¡ãããåæ°ãšæåŸã«å®è¡ãããæå»ãèšé²ããŸãã
./vol.py -f file.dmp windows.registry.userassist.UserAssist
â
ãµãŒãã¹
./vol.py -f file.dmp windows.svcscan.SvcScan #List services
./vol.py -f file.dmp windows.getservicesids.GetServiceSIDs #Get the SID of services
ãããã¯ãŒã¯
./vol.py -f file.dmp windows.netscan.NetScan
#For network info of linux use volatility2
ã¬ãžã¹ããªãã€ã
å©çšå¯èœãªãã€ãã衚瀺
./vol.py -f file.dmp windows.registry.hivelist.HiveList #List roots
./vol.py -f file.dmp windows.registry.printkey.PrintKey #List roots and get initial subkeys
å€ãååŸãã
./vol.py -f file.dmp windows.registry.printkey.PrintKey --key "Software\Microsoft\Windows NT\CurrentVersion"
ãã³ã
#Dump a hive
volatility --profile=Win7SP1x86_23418 hivedump -o 0x9aad6148 -f file.dmp #Offset extracted by hivelist
#Dump all hives
volatility --profile=Win7SP1x86_23418 hivedump -f file.dmp
ãã¡ã€ã«ã·ã¹ãã
ããŠã³ã
#See vol2
ã¹ãã£ã³/ãã³ã
./vol.py -f file.dmp windows.filescan.FileScan #Scan for files inside the dump
./vol.py -f file.dmp windows.dumpfiles.DumpFiles --physaddr <0xAAAAA> #Offset from previous command
ãã¹ã¿ãŒãã¡ã€ã«ããŒãã«
# I couldn't find any plugin to extract this information in volatility3
NTFSãã¡ã€ã«ã·ã¹ãã ã¯ããã¹ã¿ãŒãã¡ã€ã«ããŒãã«ïŒMFTïŒãšããŠç¥ãããéèŠãªã³ã³ããŒãã³ãã䜿çšããŸãããã®ããŒãã«ã«ã¯ãããªã¥ãŒã äžã®ãã¹ãŠã®ãã¡ã€ã«ã«å¯ŸããŠå°ãªããšã1ã€ã®ãšã³ããªãå«ãŸããŠãããMFTèªäœãã«ããŒããŠããŸãããµã€ãºãã¿ã€ã ã¹ã¿ã³ããæš©éãå®éã®ããŒã¿ãªã©ãåãã¡ã€ã«ã«é¢ããéèŠãªè©³çްã¯ãMFTãšã³ããªå ãŸãã¯MFTã®å€éšã«ããããããã®ãšã³ããªã«ãã£ãŠåç §ãããé åã«ã«ãã»ã«åãããŠããŸãã詳现ã«ã€ããŠã¯ãå ¬åŒããã¥ã¡ã³ããåç §ããŠãã ããã
SSLããŒ/èšŒææž
#vol3 allows to search for certificates inside the registry
./vol.py -f file.dmp windows.registry.certificates.Certificates
ãã«ãŠã§ã¢
./vol.py -f file.dmp windows.malfind.Malfind [--dump] #Find hidden and injected code, [dump each suspicious section]
#Malfind will search for suspicious structures related to malware
./vol.py -f file.dmp windows.driverirp.DriverIrp #Driver IRP hook detection
./vol.py -f file.dmp windows.ssdt.SSDT #Check system call address from unexpected addresses
./vol.py -f file.dmp linux.check_afinfo.Check_afinfo #Verifies the operation function pointers of network protocols
./vol.py -f file.dmp linux.check_creds.Check_creds #Checks if any processes are sharing credential structures
./vol.py -f file.dmp linux.check_idt.Check_idt #Checks if the IDT has been altered
./vol.py -f file.dmp linux.check_syscall.Check_syscall #Check system call table for hooks
./vol.py -f file.dmp linux.check_modules.Check_modules #Compares module list to sysfs info, if available
./vol.py -f file.dmp linux.tty_check.tty_check #Checks tty devices for hooks
Yaraã䜿ã£ãã¹ãã£ã³
ãã®ã¹ã¯ãªããã䜿çšããŠãgithubãããã¹ãŠã®yaraãã«ãŠã§ã¢ã«ãŒã«ãããŠã³ããŒãããŠããŒãžããŸã: https://gist.github.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9
_rulesãã£ã¬ã¯ããªãäœæããå®è¡ããŸããããã«ããããã¹ãŠã®ãã«ãŠã§ã¢çšã®yaraã«ãŒã«ãå«ãmalware_rules.yar_ãšãããã¡ã€ã«ãäœæãããŸãã
wget https://gist.githubusercontent.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9/raw/4ec711d37f1b428b63bed1f786b26a0654aa2f31/malware_yara_rules.py
mkdir rules
python malware_yara_rules.py
#Only Windows
./vol.py -f file.dmp windows.vadyarascan.VadYaraScan --yara-file /tmp/malware_rules.yar
#All
./vol.py -f file.dmp yarascan.YaraScan --yara-file /tmp/malware_rules.yar
MISC
å€éšãã©ã°ã€ã³
å€éšãã©ã°ã€ã³ã䜿çšãããå Žåã¯ããã©ã°ã€ã³ã«é¢é£ãããã©ã«ããæåã®ãã©ã¡ãŒã¿ãšããŠäœ¿çšãããããšã確èªããŠãã ããã
./vol.py --plugin-dirs "/tmp/plugins/" [...]
Autoruns
https://github.com/tomchop/volatility-autoruns ããããŠã³ããŒãããŠãã ããã
volatility --plugins=volatility-autoruns/ --profile=WinXPSP2x86 -f file.dmp autoruns
Mutexes
./vol.py -f file.dmp windows.mutantscan.MutantScan
ã·ã³ããªãã¯ãªã³ã¯
./vol.py -f file.dmp windows.symlinkscan.SymlinkScan
Bash
ã¡ã¢ãªããbashã®å±¥æŽãèªã¿åãããšãå¯èœã§ãã _.bash_history_ãã¡ã€ã«ããã³ãããããšãã§ããŸãããç¡å¹ã«ãªã£ãŠããããããã®volatilityã¢ãžã¥ãŒã«ã䜿çšã§ããããšãå¬ããæãã§ãããã
./vol.py -f file.dmp linux.bash.Bash
ã¿ã€ã ã©ã€ã³
./vol.py -f file.dmp timeLiner.TimeLiner
ãã©ã€ããŒ
./vol.py -f file.dmp windows.driverscan.DriverScan
ã¯ãªããããŒããååŸãã
#Just vol2
volatility --profile=Win7SP1x86_23418 clipboard -f file.dmp
IEã®å±¥æŽãååŸãã
#Just vol2
volatility --profile=Win7SP1x86_23418 iehistory -f file.dmp
Notepadã®ããã¹ããååŸãã
#Just vol2
volatility --profile=Win7SP1x86_23418 notepad -f file.dmp
ã¹ã¯ãªãŒã³ã·ã§ãã
#Just vol2
volatility --profile=Win7SP1x86_23418 screenshot -f file.dmp
ãã¹ã¿ãŒããŒãã¬ã³ãŒã (MBR)
volatility --profile=Win7SP1x86_23418 mbrparser -f file.dmp
ãã¹ã¿ãŒããŒãã¬ã³ãŒã (MBR) ã¯ãã¹ãã¬ãŒãžã¡ãã£ã¢ã®è«çããŒãã£ã·ã§ã³ã管çããäžã§éèŠãªåœ¹å²ãæãããŸãããããã®ããŒãã£ã·ã§ã³ã¯ç°ãªã ãã¡ã€ã«ã·ã¹ãã ã§æ§æãããŠããŸããMBRã¯ããŒãã£ã·ã§ã³ã®ã¬ã€ã¢ãŠãæ å ±ãä¿æããã ãã§ãªããããŒãããŒããŒãšããŠæ©èœããå®è¡å¯èœã³ãŒããå«ãŸããŠããŸãããã®ããŒãããŒããŒã¯ãOSã®ã»ã«ã³ãã¹ããŒãžã®ããŒãããã»ã¹ãçŽæ¥éå§ãããïŒã»ã«ã³ãã¹ããŒãžããŒãããŒã㌠ãåç §ïŒãåããŒãã£ã·ã§ã³ã® ããªã¥ãŒã ããŒãã¬ã³ãŒã (VBR) ãšé£æºããŠåäœããŸãã詳现ã«ã€ããŠã¯ãMBRã®WikipediaããŒãž ãåç §ããŠãã ããã
åèæç®
- https://andreafortuna.org/2017/06/25/volatility-my-own-cheatsheet-part-1-image-identification/
- https://scudette.blogspot.com/2012/11/finding-kernel-debugger-block.html
- https://or10nlabs.tech/cgi-sys/suspendedpage.cgi
- https://www.aldeid.com/wiki/Windows-userassist-keys â* https://learn.microsoft.com/en-us/windows/win32/fileio/master-file-table
- https://answers.microsoft.com/en-us/windows/forum/all/uefi-based-pc-protective-mbr-what-is-it/0fc7b558-d8d4-4a7d-bae2-395455bb19aa
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã


