For a complete list of all plugins at your fingertips, open a separate Terminal and run the volatility -h command, rather than having to scroll to the top of the Terminal that you are using to run Volatility plugin commands:
Introduction: Basic Volatility UsageFinding the RAM Image to ExamineIn your Kali Linux machine, open a Terminalwindow and execute these commands:cdcd Desktopls -lNote that the last command is"LS -L" in lowercase.You should see the memdump.mem file, whichshould be approximately 500 MB in size,as shown below. If you do not, you may needto repeat a previous project to create thememory image again.Starting VolatilityIn your Kali Linux machine, in a Terminalwindow, execute this command:volatility -hYou see a long help message,as shown below:The volatility help is long and confusing.Fortunately, SANS has made ahandy one-pagecheat sheetwhich is much friendlier.The part that is important to us is shownbelow:Basic Volatilty UsageImage InformationIn your Kali Linux machine, in a Terminalwindow, execute this command:volatility imageinfo -f /root/Desktop/memdump.memThis shows basic information about the image,such as the operating system of the machinethat was imaged, and when the image was made,as shown below:Volatility needs to know what operating systemwas imaged in order to interpret the memoryimage correctly. The default profile is WinXPSP2x86,but we used Win2008SP1x86, so we'll have to includethat information in all future volatility command-lines.Running ProcessesIn your Kali Linux machine, in a Terminalwindow, execute this command:volatility pslist --profile=Win2016x64_14393 -f /root/Desktop/memdump.memThis shows the processes that were runningon the machine when the RAM image was made,as shown below:Notice these columns:
Hello learners, in the first part of our tutorial we learnt how to obtain a volatility memory dump from a computer which either maybe the victim computer or the computer used to launch an attack. From the acquired memory dump, an investigator can be able to determine the processes that were running on the computer hence he/she can also be able to come up with solid evidence which can be used against the suspects involved in a law suit. In this guide, we will be doing a digital forensic analysis on a volatility memory dump.
We can now check for commands which were ran on the PC under investigation. Checking commands can help an investigator while he/she gathers evidence from the volatility memory dump. We will be checking out for process 1484.
On this step we will extract the reader_sl.exe from the volatility memory dump to a folder on our PC. From here, we can be able to perform a malware analysis on the reader_sl.exe. To export the file we will be using a different plugin as shown below.
On the above guide, we were able to perform a volatility memory analysis to gather information from a victim computer as it appears in our findings. We were able to discover a malware which has camouflaged as a known process to the user. This is one of the common method used by hackers when stealing information.
760c119bf3