Volatility - CheatSheet
最后更新于
最后更新于
Volatility有两种主要的插件方法,有时可以从它们的名称中反映出来。“list”插件将尝试浏览Windows内核结构,以检索诸如进程(在内存中定位和遍历_EPROCESS
结构的链接列表)、操作系统句柄(定位和列出句柄表,取消引用找到的任何指针等)等信息。它们的行为几乎与请求Windows API列出进程时的行为相同。
这使得“list”插件非常快速,但与Windows API一样容易受到恶意软件的操纵。例如,如果恶意软件使用DKOM从_EPROCESS
链接列表中取消链接一个进程,它将不会显示在任务管理器中,pslist中也不会显示。
另一方面,“scan”插件将采用类似于在内存中雕刻可能在解除引用为特定结构时有意义的内容的方法。例如,psscan
将读取内存并尝试从中创建_EPROCESS
对象(它使用池标签扫描,搜索指示感兴趣结构存在的4字节字符串)。优点是它可以找到已退出的进程,即使恶意软件篡改了_EPROCESS
链接列表,插件仍将在内存中找到该结构(因为该结构仍然需要存在以使进程运行)。缺点是“scan”插件比“list”插件慢一些,有时可能产生误报(进程已退出太久,其结构的部分被其他操作覆盖)。
如readme中所述,您需要将要支持的操作系统的符号表放入_volatility3/volatility/symbols_中。 各种操作系统的符号表包可在以下位置下载:
您可以执行以下操作获取支持的配置文件列表:
如果要使用您已下载的新配置文件(例如 Linux 配置文件),您需要在某个地方创建以下文件夹结构:plugins/overlays/linux,并将包含配置文件的 zip 文件放入此文件夹中。然后,使用以下命令获取配置文件的编号:
在前面的片段中,您可以看到配置文件被称为LinuxCentOS7_3_10_0-123_el7_x86_64_profilex64
,您可以使用它来执行类似以下操作:
始终查看 kdbgscan 找到的进程数量。有时,imageinfo 和 kdbgscan 可能会找到 多个适合的 配置文件,但只有 有效的配置文件 才会有一些与进程相关的内容(这是因为提取进程需要正确的 KDBG 地址)。
内核调试器块,由Volatility称为KDBG,对于Volatility和各种调试器执行的取证任务至关重要。被标识为KdDebuggerDataBlock
,类型为_KDDEBUGGER_DATA64
,其中包含诸如PsActiveProcessHead
之类的关键引用。这个特定引用指向进程列表的头部,使得能够列出所有进程,这对于彻底的内存分析至关重要。
插件banners.Banners
可在vol3中用于尝试在转储文件中查找Linux横幅。
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
volvality -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Analyzing Drivers json
volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing Packed Binaries
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handle
Analyzing Process Memory
volatility -f <memory_dump> --profile=<profile> memmap
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
进程的内存转储将提取进程当前状态的所有内容。procdump 模块将仅提取代码。
尝试查找可疑进程(按名称)或意外的子进程(例如,cmd.exe 作为 iexplorer.exe 的子进程)。 比较 pslist 的结果和 psscan 的结果以识别隐藏进程可能会很有趣。
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljsonity -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Dumping Registry Hive
volatility -f <memory_dump> --profile=<profile> dumpregistry -o <offset> -D <output_directory>
File Analysis
voljsonity -f <memory_dump> --profile=<profile> filescan
Dumping a File json - volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Driver Modules
volatility -f <memory_dump> --profile=<profile> driverscan
Crash Dump Analysis
volatility -f <memory_dump> --profile=<profile> memmap
Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Accounts json - volatility -f <memory_dump> --profile=<profile> userassist
Screenshots
volatility -f <memory_dump> --profile=<profile> screenshot -D <output_directory>
Yara Scanning
volatility -f <memory_dump> --profile=<profile> yarascan --yara-file=<rules_file>
API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Objects
volvoljsonity -f <memory_dump> --profile=<profile> hiddenevents
Detecting Rootkits
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Injection
volatility -f <memory_dump> --profile=<profile> malfind
Detecting API-Hooking
volatility -f <memory_dump> --profile=<profile> malfind
Detecting SSDT Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting IRP Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting IDT Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Inline Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Hollow Processes
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Processes
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked DLLs
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Drivers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked File Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Mutant Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Registry Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Token Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Desktop Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Keyed Event Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Io Completion Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Timer Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked ALPC Ports
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
**Detecting
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
voljsonity -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Extracting Registry Hjson
volatility -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Identifying Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> ldrmodules
Checking for Rootkits
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyating Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
是否执行了任何可疑操作?
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljsonity -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive json - volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
File Extraction
volatility -f <memory_dump> --profile=<profile> filescan | grep -i <file_extension>
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Kernel Driver Modules
volatility -f <memory_dump> --profile=<profile> modscan
Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Accounts
volatility -f <memory_dump> --profile=<profile> userassist
Screenshots
volatility -f <memory_dump> --profile=<profile> screenshot -D <output_directory>
Yara Scanning
voljsonity -f <memory_dump> --profile=<profile> yarascan --yara-rules=<rules_file>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Handles
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden TCP/UDP Ports
volatility -f <memory_dump> --profile=<profile> portscan
Detecting Hidden Driver Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notsuss
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Driver Objects
volatility -f <memory_dump> --profile=<profile> driverirp
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivescan
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notsuss
Detecting Hidden Mutants
volvoljsonity -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Driver Objects
volatility -f <memory_dump> --profile=<profile> driverirp
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivescan
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden GDT Hooks json - volatility -f <memory_dump> --profile=<profile> gdt
Detecting Hidden EAT Hooks
volatility -f <memory_dump> --profile=<profile> eat
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notsuss
Detecting Hidden Mutants
volvoljsonity -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Driver Objects
volatility -f <memory_dump> --profile=<profile> driverirp
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivescan
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden GDT Hooks
volatility -f <memory_dump> --profile=<profile> gdt
Detecting Hidden EAT Hooks
volatility -f <memory_dump> --profile=<profile> eat
在cmd.exe
中执行的命令由**conhost.exe
(或在Windows 7之前的系统上为csrss.exe
)管理。这意味着,如果在获取内存转储之前攻击者终止了cmd.exe
,仍然可以从conhost.exe
的内存中恢复会话的命令历史记录。要做到这一点,如果检测到控制台模块中的异常活动,应该转储相关conhost.exe
进程的内存。然后,通过在此转储中搜索字符串**,可以潜在地提取会话中使用的命令行。
获取每个运行进程的环境变量。可能会有一些有趣的值。
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
voljsonity -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> printkey -K <key_path>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers json - volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Dumping Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing LDRModules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyating API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing CSRSS
volatility -f <memory_dump> --profile=<profile> csrss
Analyzing Print Spooler
volatility -f <memory_dump> --profile=<profile> printkey
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
`volatility -f <memory_dump> --profile=
检查意外服务中的特权令牌。 列出使用某些特权令牌的进程可能很有趣。
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljsonity -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive json - volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
File Extraction
volatility -f <memory_dump> --profile=<profile> filescan
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Driver Modules
volatility -f <memory_dump> --profile=<profile> driverscan
SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
UserAssist
voljsonity -f <memory_dump> --profile=<profile> userassist
Privileges
volatility -f <memory_dump> --profile=<profile> privs
Crash Dumps
volatility -f <memory_dump> --profile=<profile> crashinfo
Yara Scanning
volatility -f <memory_dump> --profile=<profile> yarascan --yara-file=<rules_file>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
`volatility -f <memory_dump> --profile= memdump -p -D <
检查每个进程拥有的SSID。 列出使用特权SID的进程(以及使用某些服务SID的进程)可能会很有趣。
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
voljson -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Advanced Commands
Analyzing a Process
volatility -f <memory_dump> --profile=<profile> pstree -p <pid>
Extracting DLLs json
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Plugin Development
Creating a New Plugin
Create a new Python file in the volatility/plugins
directory
Implement the plugin using the Volatility API
Use the vol.py
command with the --plugins
option to load the custom plugin
有助于了解进程打开了哪些其他文件、密钥、线程、进程...
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
voljson -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Creating a New Plugin
Compiling Plugins
python vol.py --plugins=<plugin_directory>
Using Custom Plugins
volatility --plugins=<custom_plugin_directory> -f <memory_dump> <custom_plugin_name>
Basic Forensic Methodology
Memory Dump Analysis
Identify Profile: vol.py -f memory_dump.raw imageinfo
Analyze Processes: vol.py -f memory_dump.raw --profile=Win7SP1x64 pslist
Analyze DLLs: vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllist
Analyze Handles: vol.py -f memory_dump.raw --profile=Win7SP1x64 handles
Analyze Registry: vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
Analyze Network Connections: vol.py -f memory_dump.raw --profile=Win7SP1x64 netscan
Analyze Drivers: vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscan
Analyze Mutants: vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscan
Analyze Sockets: vol.py -f memory_dump.raw --profile=Win7SP1x64 sockets
Analyze Autostart Locations: vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
File Analysis
Analyze MFT: vol.py -f memory_dump.raw --profile=Win7SPjson1 mftparser
Analyze File Metadata: vol.py -f memory_dump.raw --profile=Win7SP1x64 filescan
Timeline Analysis
Create Timeline: vol.py -f memory_dump.raw --profile=Win7SP1x64 mactime
Malware Analysis
Analyze Malware: vol.py -f memory_dump.raw --profile=Win7SP1x64 malfind
Rootkit Detection
Detect Rootkits: vol.py -f memory_dump.raw --profile=Win7SP1x64 rootkit
Memory Analysis
Analyze Memory: vol.py -f memory_dump.raw --profile=Win7SP1x64 memmap
User Analysis
AnAnalyze Users: vol.py -f memory_dump.raw --profile=Win7SP1x64 userassist
Registry Analysis
Analyze Registry: vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
Network Analysis
Analyze Network: vol.py -f memory_dump.raw --profile=Win7SP1x64 netscan
Process Analysis
Analyze Processes: vol.py -f memory_dump.raw --profile=Win7SP1x64 pslist
DLL Analysis
Analyze DLLs: vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllist
Handle Analysis
Analyze Handles: vol.py -f memory_dump.raw --profile=Win7SP1x64 handles
Driver Analysis
Analyze Drivers: vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscan
Mutant Analysis
Analyze Mutants: vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscan
Socket Analysis
Analyze Sockets: vol.py -f memory_dump.raw --profile=Win7SP1x64 sockets
Autostart Analysis
Analyze Autostart Locations: vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
MFT Analysis
Analyze MFT: vol.py -f memory_dump.raw --profile=Win7SP1x64 mftparser
File Metadata Analysis
Analyze File Metadata: vol.py -f memory_dump.raw --profile=Win7SP1x64 filescan
Timeline Creation
Create Timeline: vol.py -f memory_dump.raw --profile=Win7SP1x64 mactime
Malware Analysis
Analyze Malware: vol.py -f memory_dump.raw --profile=Win7SP1x64 malfind
Rootkit Detection
Detect Rootkits: vol.py -f memory_dump.raw --profile=Win7SP1x64 rootkit
Memory Analysis
Analyze Memory: vol.py -f memory_dump.raw --profile=Win7SP1x64 memmap
User Analysis
Analyze Users: vol.py -f memory_dump.raw --profile=Win7SP1x64 userassist
Registry Analysis
Analyze Registry: vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
Network Analysis
Analyze Network: vol.py -f memory_dump.raw --profile=Win7SP1x64 netscan
Process Analysis
Analyze Processes: vol.py -f memory_dump.raw --profile=Win7SP1x64 pslist
DLL Analysis
Analyze DLLs: vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllist
Handle Analysis
Analyze Handles: vol.py -f memory_dump.raw --profile=Win7SP1x64 handles
Driver Analysis
Analyze Drivers: vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscan
Mutant Analysis
Analyze Mutants: vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscan
Socket Analysis
Analyze Sockets: vol.py -f memory_dump.raw --profile=Win7SP1x64 sockets
Autostart Analysis
Analyze Autostart Locations: vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
MFT Analysis
Analyze MFT: vol.py -f memory_dump.raw --profile=Win7SP1x64 mftparser
File Metadata Analysis
Analyze File Metadata: vol.py -f memory_dump.raw --profile=Win7SP1x64 filescan
Timeline Creation
Create Timeline: vol.py -f memory_dump.raw --profile=Win7SP1x64 mactime
Malware Analysis
Analyze Malware: vol.py -f memory_dump.raw --profile=Win7SP1x64 malfind
Rootkit Detection
Detect Rootkits: vol.py -f memory_dump.raw --profile=Win7SP1x64 rootkit
Memory Analysis
Analyze Memory: vol.py -f memory_dump.raw --profile=Win7SP1x64 memmap
User Analysis
Analyze Users: vol.py -f memory_dump.raw --profile=Win7SP1x64 userassist
Registry Analysis
Analyze Registry: vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
Network Analysis
Analyze Network: vol.py -f memory_dump.raw --profile=Win7SP1x64 netscan
Process Analysis
Analyze Processes: vol.py -f memory_dump.raw --profile=Win7SP1x64 pslist
DLL Analysis
Analyze DLLs: vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllist
Handle Analysis
Analyze Handles: vol.py -f memory_dump.raw --profile=Win7SP1x64 handles
Driver Analysis
Analyze Drivers: vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscan
Mutant Analysis
Analyze Mutants: vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscan
Socket Analysis
Analyze Sockets: vol.py -f memory_dump.raw --profile=Win7SP1x64 sockets
Autostart Analysis
Analyze Autostart Locations: vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
MFT Analysis
Analyze MFT: vol.py -f memory_dump.raw --profile=Win7SP1x64 mftparser
File Metadata Analysis
Analyze File Metadata: vol.py -f memory_dump.raw --profile=Win7SP1x64 filescan
Timeline Creation
Create Timeline: vol.py -f memory_dump.raw --profile=Win7SP1x64 mactime
Malware Analysis
Analyze Malware: vol.py -f memory_dump.raw --profile=Win7SP1x64 malfind
Rootkit Detection
Detect Rootkits: vol.py -f memory_dump.raw --profile=Win7SP1x64 rootkit
Memory Analysis
Analyze Memory: vol.py -f memory_dump.raw --profile=Win7SP1x64 memmap
User Analysis
Analyze Users: vol.py -f memory_dump.raw --profile=Win7SP1x64 userassist
Registry Analysis
Analyze Registry: vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
Network Analysis
Analyze Network: vol.py -f memory_dump.raw --profile=Win7SP1x64 netscan
Process Analysis
Analyze Processes: vol.py -f memory_dump.raw --profile=Win7SP1x64 pslist
DLL Analysis
Analyze DLLs: vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllist
Handle Analysis
Analyze Handles: vol.py -f memory_dump.raw --profile=Win7SP1x64 handles
Driver Analysis
Analyze Drivers: vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscan
Mutant Analysis
Analyze Mutants: vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscan
Socket Analysis
Analyze Sockets: vol.py -f memory_dump.raw --profile=Win7SP1x64 sockets
Autostart Analysis
Analyze Autostart Locations: vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
Volatility允许我们检查一个字符串属于哪个进程。
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
voljson -f <memory_dump> --profile=<profile> netscan
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> --dump-dir=<output_directory>
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry json
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers
voljson -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Mutantscan
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Yarascan
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Privilege Rights
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Kernel Hooks
volatility -f <memory_dump> --profile=<profile> kdbgscan
Analyzing Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Analyzing GDI Tables
volatility -f <memory_dump> --profile=<profile> gditimers
Analyzing GDI Shared Handles
volatility -f <memory_dump> --profile=<profile> gdiview
Analyzing GDI Objects
volatility -f <memory_dump> --profile=<profile> gdiobjects
Analyzing Atom Tables
volatility -f <memory_dump> --profile=<profile> atomscan
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Windows Stations
volatility -f <memory_dump> --profile=<profile> windows
Analyzing Sessions
volatility -f <memory_dump> --profile=<profile> sessions
Analyzing Printers
volatility -f <memory_dump> --profile=<profile> printers
Analyzing Shimcache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing TrueCrypt Keys
volatility -f <memory_dump> --profile=<profile> truecryptmaster
Analyzing Bitlocker Keys
volatility -f <memory_dump> --profile=<profile> bitlockermemory
Analyzing LUKS Keys
volatility -f <memory_dump> --profile=<profile> luksmeta
Analyzing Chrome Extensions
volatility -f <memory_dump> --profile=<profile> chromehistory
Analyzing Firefox Extensions
volatility -f <memory_dump> --profile=<profile> firefoxhistory
Analyzing IE History
volatility -f <memory_dump> --profile=<profile> iehistory
Analyzing LSA Secrets
volatility -f <memory_dump> --profile=<profile> lsadump
Analyizing Hashdump
volatility -f <memory_dump> --profile=<profile> hashdump
Analyzing User Assist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MBR
volatility -f <memory_dump> --profile=<profile> mbrparser
Analyzing VBR
volatility -f <memory_dump> --profile=<profile> vbrparser
Analyzing Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing User Profiles
volatility -f <memory_dump> --profile=<profile> userprofiles
Analyzing PEB
volatility -f <memory_dump> --profile=<profile> peb
Analyzing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyizing Privilege Rights
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Kernel Hooks
volatility -f <memory_dump> --profile=<profile> kdbgscan
Analyzing Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Analyzing GDI Tables
volatility -f <memory_dump> --profile=<profile> gditimers
Analyzing GDI Shared Handles
volatility -f <memory_dump> --profile=<profile> gdiview
Analyzing GDI Objects
volatility -f <memory_dump> --profile=<profile> gdiobjects
Analyzing Atom Tables
volatility -f <memory_dump> --profile=<profile> atomscan
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Windows Stations
volatility -f <memory_dump> --profile=<profile> windows
Analyzing Sessions
volatility -f <memory_dump> --profile=<profile> sessions
Analyzing Printers
volatility -f <memory_dump> --profile=<profile> printers
Analyzing Shimcache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing TrueCrypt Keys
volatility -f <memory_dump> --profile=<profile> truecryptmaster
Analyzing Bitlocker Keys
volatility -f <memory_dump> --profile=<profile> bitlockermemory
Analyzing LUKS Keys
volatility -f <memory_dump> --profile=<profile> luksmeta
Analyzing Chrome Extensions
volatility -f <memory_dump> --profile=<profile> chromehistory
Analyzing Firefox Extensions
volatility -f <memory_dump> --profile=<profile> firefoxhistory
Analyzing IE History
volatility -f <memory_dump> --profile=<profile> iehistory
Analyzing LSA Secrets
volatility -f <memory_dump> --profile=<profile> lsadump
Analyzing Hashdump
volatility -f <memory_dump> --profile=<profile> hashdump
Analyzing User Assist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MBR
volatility -f <memory_dump> --profile=<profile> mbrparser
Analyzing VBR
volatility -f <memory_dump> --profile=<profile> vbrparser
Analyzing Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing User Profiles
volatility -f <memory_dump> --profile=<profile> userprofiles
Analyzing PEB
volatility -f <memory_dump> --profile=<profile> peb
Analyzing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyizing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Privilege Rights
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Kernel Hooks
volatility -f <memory_dump> --profile=<profile> kdbgscan
Analyzing Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Analyzing GDI Tables
volatility -f <memory_dump> --profile=<profile> gditimers
Analyzing GDI Shared Handles
volatility -f <memory_dump> --profile=<profile> gdiview
Analyzing GDI Objects
volatility -f <memory_dump> --profile=<profile> gdiobjects
Analyzing Atom Tables
volatility -f <memory_dump> --profile=<profile> atomscan
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Windows Stations
volatility -f <memory_dump> --profile=<profile> windows
Analyzing Sessions
volatility -f <memory_dump> --profile=<profile> sessions
Analyizing Printers
volatility -f <memory_dump> --profile=<profile> printers
Analyzing Shimcache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing TrueCrypt Keys
volatility -f <memory_dump> --profile=<profile> truecryptmaster
Analyzing Bitlocker Keys
volatility -f <memory_dump> --profile=<profile> bitlockermemory
Analyzing LUKS Keys
volatility -f <memory_dump> --profile=<profile> luksmeta
Analyzing Chrome Extensions
volatility -f <memory_dump> --profile=<profile> chromehistory
Analyzing Firefox Extensions
volatility -f <memory_dump> --profile=<profile> firefoxhistory
Analyzing IE History
volatility -f <memory_dump> --profile=<profile> iehistory
Analyzing LSA Secrets
volatility -f <memory_dump> --profile=<profile> lsadump
Analyzing Hashdump
volatility -f <memory_dump> --profile=<profile> hashdump
Analyzing User Assist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MBR
volatility -f <memory_dump> --profile=<profile> mbrparser
Analyzing VBR
volatility -f <memory_dump> --profile=<profile> vbrparser
Analyzing Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing User Profiles
volatility -f <memory_dump> --profile=<profile> userprofiles
Analyzing PEB
volatility -f <memory_dump> --profile=<profile> peb
Analyzing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyizing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
`volatility -f <memory_dump> --profile=<profile
它还允许使用yarascan模块在进程内搜索字符串:
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
voljsonity -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> printkey -K <registry_key>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers json - volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Crashes
volatility -f <memory_dump> --profile=<profile> pslist
Analyzing Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Analyizing ImpHash
volatility -f <memory_dump> --profile=<profile> impscan
Analyzing API Audit
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Trace
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Monitor
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Windows 在注册表中使用名为 UserAssist keys 的功能来跟踪您运行的程序。这些键记录每个程序被执行的次数以及上次运行的时间。
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
voljson -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Advanced Commands
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malfind
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Timelining
volatility -f <memory_dump> --profile=<profile> timeliner
Plugin Options
Using Specific Plugin
volatility -f <memory_dump> --profile=<profile> <plugin_name>
Plugin Help
volatility --info | grep <plugin_name>
Plugin Options
volatility --info | grep <plugin_name> -A <number_of_lines>
在进行内存转储分析时,以下是一些常用的Volatility命令和技巧:
查看进程列表:volatility -f <memory_dump> --profile=<profile> pslist
查看网络连接:volatility -f <memory_dump> --profile=<profile> netscan
查看注册表信息:volatility -f <memory_dump> --profile=<profile> printkey -K <registry_key>
查看文件信息:volatility -f <memory_dump> --profile=<profile> filescan
记住,使用适当的插件和配置文件来确保分析的准确性和完整性。
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Listing Sockets
voljson -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive json- volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
File Extraction
volatility -f <memory_dump> --profile=<profile> filescan | grep -i <file_extension>
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Rootkit Detection
volatility -f <memory_dump> --profile=<profile> malfind
Process Tree
volatility -f <memory_dump> --profile=<profile> pstree
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Account Information
volatility -f <memory_dump> --profile=<profile> userassist
Screen Capture
volatility -f <memory_dump> --profile=<profile> screenshot -D <output_directory>
Kernel Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Crash Dump Analysis
volatility -f <memory_dump> --profile=<profile> ldrmodules
API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden IDT Hooks
voljson -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
`volatility -f <memory_dump> --profile=<profile
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
voljson -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting Files
volatility -f <memory_dump> --profile=<profile> filescan
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Process Memory
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Identifying Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Analyzing Timelining
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing Packed Binaries
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Registry Transactions
volatility -f <memory_dump> --profile=<profile> printkey -K <key>
Analyzing User Assist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing TrueCrypt Keys
volatility -f <memory_dump> --profile=<profile> truecryptmaster
Analyzing LUKS Keys
volatility -f <memory_dump> --profile=<profile> luksmeta
Analyzing Bitlocker Keys
volatility -f <memory_dump> --profile=<profile> bitlocker
Analyzing Chrome Extensions
volatility -f <memory_dump> --profile=<profile> chromehistory
Analyzing Firefox Extensions
volatility -f <memory_dump> --profile=<profile> firefoxhistory
Analyzing Internet Explorer History
volatility -f <memory_dump> --profile=<profile> iehistory
Analyzing Outlook Memory
volatility -f <memory_dump> --profile=<profile> outlook
Analyzing Thunderbird Memory
volatility -f <memory_dump> --profile=<profile> thunderbird
Analyzing Skype Memory
volatility -f <memory_dump> --profile=<profile> skype
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
voljson -f <memory_dump> --profile=<profile> dlllist
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive
volvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
File Extraction
volatility -f <memory_dump> --profile=<profile> filescan
Dumping a File json -f <memory_dump> --profile= dumpfiles -Q <physical_offset> -D <output_directory>`
Kernel Driver Analysis
volatility -f <memory_dump> --profile=<profile> driverscan
Dumping Kernel Driver
volatility -f <memory_dump> --profile=<profile> moddump -o <offset> -D <output_directory>
Process Tree
volatility -f <memory_dump> --profile=<profile> pstree
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Accounts
volatility -f <memory_dump> --profile=<profile> useraccounts
Dumping SAM
volatility -f <memory_dump> --profile=<profile> hashdump -y <offset>
Crash Dump Analysis
volatility -f <memory_dump> --profile=<profile> memmap
Rootkit Detection
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivescan
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
**Detecting
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
voljson -f <memory_dump> --profile=<profile> dlllist
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Accounts
voljson -f <memory_dump> --profile=<profile> useraccounts
Dumping a File json
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Process Tree
volatility -f <memory_dump> --profile=<profile> pstree
Kernel Drivers json
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Rootkits
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Extracting Files
volatility -f <memory_dump> --profile=<profile> filescan
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Dumping Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Network Packets
volatility -f <memory_dump> --profile=<profile> netscan
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Registry Handles
volatility -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Services
volatility -f <memory_dump> --profile=<profile> svcscan
Analyzing TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Analyzing User Sessions
volatility -f <memory_dump> --profile=<profile> sessions
Analyzing Windows
volatility -f <memory_dump> --profile=<profile> windows
Analyzing WMI
volatility -f <memory_dump> --profile=<profile> wmiscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing Zipped Files
volatility -f <memory_dump> --profile=<profile> zipscan
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volvolatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
volmemory_dump> --profile=<profile> file -S <start_address> -E <end_address> -D <output_directory>
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Identifying Hidden Modules
voljson --output=json
Analyzing Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Extracting Kernel Drivers
volatility -f <memory_dump> --profile=<profile> moddump -D <output_directory>
Analyzing Timelining Information
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing Suspicious Binaries
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyizing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljson -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping a Registry Hive json
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting Files
volatility -f <memory_dump> --profile=<profile> filescan | grep -i <file_extension>
Dumping LSA Secrets
volatility -f <memory_dump> --profile=<profile> lsadump
Dumping SAM
volatility -f <memory_dump> --profile=<profile> hashdump
Dumping Cached Credentials
volatility -f <memory_dump> --profile=<profile> cachedump
Analyzing ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Services
volatility -f <memory_dump> --profile=<profile> svcscan
Analyzing Timeliner
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyizing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing CSRSS
volatility -f <memory_dump> --profile=<profile> csrss
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Audit
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Analyzing SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing IRP Hooks
volatility -f <memory_dump> --profile=<profile> irp
Analyizing Scanning Modules
volatility -f <memory_dump> --profile=<profile> modscan
Analyzing Kernel Modules
volvolatility -f <memory_dump> --profile=<profile> moddump -D <output_directory>
Analyzing Kernel Drivers
volatility -f <memory_dump> --profile=<profile> kdbgscan
Analyizing Kernel Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Callbacks
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Handles
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Objects
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Modules
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Sections
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Imports
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Exports
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Allocations
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyizing Kernel Driver Unloads
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Timers
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Handlers
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Callers
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Devices
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Queues
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Pending
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Completed
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Canceled
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Read
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Write
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Device Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyizing Kernel Driver IRP Close
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Cleanup
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Create
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query EA
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyizing Kernel Driver IRP Set EA
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Flush
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Volume Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Volume Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Directory Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP File System Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Device Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Internal Device Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Shutdown
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Lock Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Cleanup
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Create Mailslot
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Security
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Security
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP System Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Device Change
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Quota
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Quota
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Device Relations
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Interface
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query PNP Device State
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Bus Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Device Text
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query ID
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Device Relations
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Resources
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Resource Requirements
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Legacy Bus Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Device Usage Notification
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Surprise Removal
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Others
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Unknown
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyizing Kernel Driver IRP Min
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Unknown
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Unknown
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Others
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Others
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Set Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Set Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Query Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Query Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
`
可以从内存中读取bash历史记录。您也可以转储.bash_history文件,但如果它被禁用,您会很高兴能够使用这个volatility模块
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
voljson -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Advanced Commands
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malfind
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Timelining
volatility -f <memory_dump> --profile=<profile> timeliner
Plugin Resources
Official Volatility Plugins
Volatility Plugin List
Volatility Plugin Development
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
volvality -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> printkey -K <key>
Extracting Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Kernel Modules
voljsonity -f <memory_dump> --profile=<profile> modscan
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Timeliner
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing CSRSS
volatility -f <memory_dump> --profile=<profile> csrss
Analyzing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyizing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing GDI Tables
volatility -f <memory_dump> --profile=<profile> gditimers
Analyzing GDI Objects
volatility -f <memory_dump> --profile=<profile> gdiobjects
Analyzing Atom Tables
volatility -f <memory_dump> --profile=<profile> atomscan
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Windows Stations
volatility -f <memory_dump> --profile=<profile> windows
Analyzing Services
volatility -f <memory_dump> --profile=<profile> svcscan
Analyzing Netscan
volatility -f <memory_dump> --profile=<profile> netscan
Analyzing Connections
volatility -f <memory_dump> --profile=<profile> connscan
Analyzing Malfind
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malprocfind
Analyzing Malware Config
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware Yara
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing Malware Strings
volatility -f <memory_dump> --profile=<profile> strings
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
`volatility -
是西班牙最重要的网络安全活动之一,也是欧洲最重要的之一。作为促进技术知识的使命,这个大会是技术和网络安全专业人士在各个领域的热点聚会。
如果您想要快速疯狂地同时运行多个Volatility插件,可以使用:
访问中的官方文档
来源:
您可以从下载Linux和Mac配置文件。
:与仅提供配置文件建议的 imageinfo 相反,kdbgscan 旨在积极识别正确的配置文件和正确的 KDBG 地址(如果存在多个)。该插件扫描与 Volatility 配置文件相关联的 KDBGHeader 签名,并应用合理性检查以减少误报。输出的详细程度和可以执行的合理性检查数量取决于 Volatility 是否能够找到 DTB,因此,如果您已经知道正确的配置文件(或者从 imageinfo 获得了配置文件建议),请确保使用它。
提取SAM哈希值,和。
是西班牙最重要的网络安全活动之一,也是欧洲最重要的之一。以促进技术知识为使命,这个大会是技术和网络安全专业人士在各个领域的热点交流会。
Refer to the official
是西班牙最重要的网络安全活动之一,也是欧洲最重要的之一。作为促进技术知识的使命,这个大会是技术和网络安全专业人士在各个领域的热点交流会。
NTFS文件系统使用一个关键组件,称为_主文件表_(MFT)。该表至少包含卷上每个文件的一个条目,也包括MFT本身。关于每个文件的重要细节,如大小、时间戳、权限和实际数据,都封装在MFT条目中或在MFT外部但由这些条目引用的区域中。更多详细信息可以在中找到。
使用此脚本从github下载并合并所有yara恶意软件规则: 创建名为_rules的目录并执行该脚本。这将创建一个名为malware_rules.yar_的文件,其中包含所有恶意软件的yara规则。
Develop custom plugins:
Official Volatility Documentation:
Memory Forensics Cheat Sheet:
从下载。
主引导记录(MBR) 在管理存储介质的逻辑分区方面发挥着至关重要的作用,这些分区使用不同的进行结构化。它不仅保存分区布局信息,还包含作为引导加载程序的可执行代码。这个引导加载程序要么直接启动操作系统的第二阶段加载过程(参见),要么与每个分区的(VBR)协同工作。欲了解更多信息,请参阅。
是西班牙最重要的网络安全活动之一,也是欧洲最重要的活动之一。作为促进技术知识的使命,这个大会是技术和网络安全专业人士在各个领域的热点交流之地。
如果您想在 HackTricks 中看到您的公司广告或下载 PDF 版本的 HackTricks,请查看!
获取
探索,我们的独家收藏品
加入 💬 或 或在 Twitter 🐦 ** 上关注我们。**
通过向 和 github 仓库提交 PR 来分享您的黑客技巧。