Volatility - CheatSheet

RootedCON 是西班牙最重要的网络安全活动之一,也是欧洲最重要的之一。作为促进技术知识的使命,这个大会是技术和网络安全专业人士在各个领域的热点聚会。
如果您想要快速疯狂地同时运行多个Volatility插件,可以使用:https://github.com/carlospolop/autoVolatility
python autoVolatility.py -f MEMFILE -d OUT_DIRECTORY -e /home/user/tools/volatility/vol.py # It will use the most important plugins (could use a lot of space depending on the size of the memory)安装
volatility3
git clone https://github.com/volatilityfoundation/volatility3.git
cd volatility3
python3 setup.py install
python3 vol.py —hvolatility2
Download the executable from https://www.volatilityfoundation.org/26git clone https://github.com/volatilityfoundation/volatility.git
cd volatility
python setup.py installVolatility Commands
访问Volatility命令参考中的官方文档
“list”与“scan”插件的说明
Volatility有两种主要的插件方法,有时可以从它们的名称中反映出来。“list”插件将尝试浏览Windows内核结构,以检索诸如进程(在内存中定位和遍历_EPROCESS结构的链接列表)、操作系统句柄(定位和列出句柄表,取消引用找到的任何指针等)等信息。它们的行为几乎与请求Windows API列出进程时的行为相同。
这使得“list”插件非常快速,但与Windows API一样容易受到恶意软件的操纵。例如,如果恶意软件使用DKOM从_EPROCESS链接列表中取消链接一个进程,它将不会显示在任务管理器中,pslist中也不会显示。
另一方面,“scan”插件将采用类似于在内存中雕刻可能在解除引用为特定结构时有意义的内容的方法。例如,psscan将读取内存并尝试从中创建_EPROCESS对象(它使用池标签扫描,搜索指示感兴趣结构存在的4字节字符串)。优点是它可以找到已退出的进程,即使恶意软件篡改了_EPROCESS链接列表,插件仍将在内存中找到该结构(因为该结构仍然需要存在以使进程运行)。缺点是“scan”插件比“list”插件慢一些,有时可能产生误报(进程已退出太久,其结构的部分被其他操作覆盖)。
来源:http://tomchop.me/2016/11/21/tutorial-volatility-plugins-malware-analysis/
操作系统配置文件
Volatility3
如readme中所述,您需要将要支持的操作系统的符号表放入_volatility3/volatility/symbols_中。 各种操作系统的符号表包可在以下位置下载:
Volatility2
外部配置文件
您可以执行以下操作获取支持的配置文件列表:
./volatility_2.6_lin64_standalone --info | grep "Profile"如果要使用您已下载的新配置文件(例如 Linux 配置文件),您需要在某个地方创建以下文件夹结构:plugins/overlays/linux,并将包含配置文件的 zip 文件放入此文件夹中。然后,使用以下命令获取配置文件的编号:
./vol --plugins=/home/kali/Desktop/ctfs/final/plugins --info
Volatility Foundation Volatility Framework 2.6
Profiles
--------
LinuxCentOS7_3_10_0-123_el7_x86_64_profilex64 - A Profile for Linux CentOS7_3.10.0-123.el7.x86_64_profile x64
VistaSP0x64 - A Profile for Windows Vista SP0 x64
VistaSP0x86 - A Profile for Windows Vista SP0 x86您可以从https://github.com/volatilityfoundation/profiles下载Linux和Mac配置文件。
在前面的片段中,您可以看到配置文件被称为LinuxCentOS7_3_10_0-123_el7_x86_64_profilex64,您可以使用它来执行类似以下操作:
./vol -f file.dmp --plugins=. --profile=LinuxCentOS7_3_10_0-123_el7_x86_64_profilex64 linux_netscan发现配置文件
volatility imageinfo -f file.dmp
volatility kdbgscan -f file.dmpimageinfo 与 kdbgscan 之间的区别
从这里:与仅提供配置文件建议的 imageinfo 相反,kdbgscan 旨在积极识别正确的配置文件和正确的 KDBG 地址(如果存在多个)。该插件扫描与 Volatility 配置文件相关联的 KDBGHeader 签名,并应用合理性检查以减少误报。输出的详细程度和可以执行的合理性检查数量取决于 Volatility 是否能够找到 DTB,因此,如果您已经知道正确的配置文件(或者从 imageinfo 获得了配置文件建议),请确保使用它。
始终查看 kdbgscan 找到的进程数量。有时,imageinfo 和 kdbgscan 可能会找到 多个适合的 配置文件,但只有 有效的配置文件 才会有一些与进程相关的内容(这是因为提取进程需要正确的 KDBG 地址)。
# GOOD
PsActiveProcessHead : 0xfffff800011977f0 (37 processes)
PsLoadedModuleList : 0xfffff8000119aae0 (116 modules)# BAD
PsActiveProcessHead : 0xfffff800011947f0 (0 processes)
PsLoadedModuleList : 0xfffff80001197ac0 (0 modules)KDBG
内核调试器块,由Volatility称为KDBG,对于Volatility和各种调试器执行的取证任务至关重要。被标识为KdDebuggerDataBlock,类型为_KDDEBUGGER_DATA64,其中包含诸如PsActiveProcessHead之类的关键引用。这个特定引用指向进程列表的头部,使得能够列出所有进程,这对于彻底的内存分析至关重要。
操作系统信息
#vol3 has a plugin to give OS information (note that imageinfo from vol2 will give you OS info)
./vol.py -f file.dmp windows.info.Info插件banners.Banners可在vol3中用于尝试在转储文件中查找Linux横幅。
Hashes/密码
提取SAM哈希值,域缓存凭据和lsa secrets。
./vol.py -f file.dmp windows.hashdump.Hashdump #Grab common windows hashes (SAM+SYSTEM)
./vol.py -f file.dmp windows.cachedump.Cachedump #Grab domain cache hashes inside the registry
./vol.py -f file.dmp windows.lsadump.Lsadump #Grab lsa secretsVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
volvality -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Analyzing Drivers json
volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing Packed Binaries
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handle
Analyzing Process Memory
volatility -f <memory_dump> --profile=<profile> memmap
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo -p <pid>
volatility --profile=Win7SP1x86_23418 hashdump -f file.dmp #Grab common windows hashes (SAM+SYSTEM)
volatility --profile=Win7SP1x86_23418 cachedump -f file.dmp #Grab domain cache hashes inside the registry
volatility --profile=Win7SP1x86_23418 lsadump -f file.dmp #Grab lsa secrets内存转储
进程的内存转储将提取进程当前状态的所有内容。procdump 模块将仅提取代码。
volatility -f file.dmp --profile=Win7SP1x86 memdump -p 2168 -D conhost/
RootedCON 是西班牙最重要的网络安全活动之一,也是欧洲最重要的之一。以促进技术知识为使命,这个大会是技术和网络安全专业人士在各个领域的热点交流会。
进程
列出进程
尝试查找可疑进程(按名称)或意外的子进程(例如,cmd.exe 作为 iexplorer.exe 的子进程)。 比较 pslist 的结果和 psscan 的结果以识别隐藏进程可能会很有趣。
python3 vol.py -f file.dmp windows.pstree.PsTree # Get processes tree (not hidden)
python3 vol.py -f file.dmp windows.pslist.PsList # Get process list (EPROCESS)
python3 vol.py -f file.dmp windows.psscan.PsScan # Get hidden process list(malware)Volatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljsonity -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Dumping Registry Hive
volatility -f <memory_dump> --profile=<profile> dumpregistry -o <offset> -D <output_directory>
File Analysis
voljsonity -f <memory_dump> --profile=<profile> filescan
Dumping a File json -
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Driver Modules
volatility -f <memory_dump> --profile=<profile> driverscan
Crash Dump Analysis
volatility -f <memory_dump> --profile=<profile> memmap
Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Accounts json -
volatility -f <memory_dump> --profile=<profile> userassistScreenshots
volatility -f <memory_dump> --profile=<profile> screenshot -D <output_directory>
Yara Scanning
volatility -f <memory_dump> --profile=<profile> yarascan --yara-file=<rules_file>
API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Objects
volvoljsonity -f <memory_dump> --profile=<profile> hiddenevents
Detecting Rootkits
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Injection
volatility -f <memory_dump> --profile=<profile> malfind
Detecting API-Hooking
volatility -f <memory_dump> --profile=<profile> malfind
Detecting SSDT Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting IRP Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting IDT Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Inline Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Hollow Processes
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Processes
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked DLLs
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Drivers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked File Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Mutant Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Registry Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Token Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Desktop Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Keyed Event Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Io Completion Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked Timer Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked ALPC Ports
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Consumers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Unlinked WMI Filters
volatility -f <memory_dump> --profile=<profile> malfind
**Detecting
volatility --profile=PROFILE pstree -f file.dmp # Get process tree (not hidden)
volatility --profile=PROFILE pslist -f file.dmp # Get process list (EPROCESS)
volatility --profile=PROFILE psscan -f file.dmp # Get hidden process list(malware)
volatility --profile=PROFILE psxview -f file.dmp # Get hidden process list转储进程
./vol.py -f file.dmp windows.dumpfiles.DumpFiles --pid <pid> #Dump the .exe and dlls of the process in the current directoryVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
voljsonity -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Extracting Registry Hjson
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Identifying Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> ldrmodules
Checking for Rootkits
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyating Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
volatility --profile=Win7SP1x86_23418 procdump --pid=3152 -n --dump-dir=. -f file.dmp命令行
是否执行了任何可疑操作?
python3 vol.py -f file.dmp windows.cmdline.CmdLine #Display process command-line argumentsVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljsonity -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive json -
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>File Extraction
volatility -f <memory_dump> --profile=<profile> filescan | grep -i <file_extension>
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Kernel Driver Modules
volatility -f <memory_dump> --profile=<profile> modscan
Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Accounts
volatility -f <memory_dump> --profile=<profile> userassist
Screenshots
volatility -f <memory_dump> --profile=<profile> screenshot -D <output_directory>
Yara Scanning
voljsonity -f <memory_dump> --profile=<profile> yarascan --yara-rules=<rules_file>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Handles
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden TCP/UDP Ports
volatility -f <memory_dump> --profile=<profile> portscan
Detecting Hidden Driver Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notsuss
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Driver Objects
volatility -f <memory_dump> --profile=<profile> driverirp
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivescan
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notsuss
Detecting Hidden Mutants
volvoljsonity -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Driver Objects
volatility -f <memory_dump> --profile=<profile> driverirp
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivescan
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden GDT Hooks json -
volatility -f <memory_dump> --profile=<profile> gdtDetecting Hidden EAT Hooks
volatility -f <memory_dump> --profile=<profile> eat
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notsuss
Detecting Hidden Mutants
volvoljsonity -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Driver Objects
volatility -f <memory_dump> --profile=<profile> driverirp
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivescan
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden GDT Hooks
volatility -f <memory_dump> --profile=<profile> gdt
Detecting Hidden EAT Hooks
volatility -f <memory_dump> --profile=<profile> eat
volatility --profile=PROFILE cmdline -f file.dmp #Display process command-line arguments
volatility --profile=PROFILE consoles -f file.dmp #command history by scanning for _CONSOLE_INFORMATION在cmd.exe中执行的命令由**conhost.exe(或在Windows 7之前的系统上为csrss.exe)管理。这意味着,如果在获取内存转储之前攻击者终止了cmd.exe,仍然可以从conhost.exe的内存中恢复会话的命令历史记录。要做到这一点,如果检测到控制台模块中的异常活动,应该转储相关conhost.exe进程的内存。然后,通过在此转储中搜索字符串**,可以潜在地提取会话中使用的命令行。
环境
获取每个运行进程的环境变量。可能会有一些有趣的值。
python3 vol.py -f file.dmp windows.envars.Envars [--pid <pid>] #Display process environment variablesVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
voljsonity -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> printkey -K <key_path>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers json -
volatility -f <memory_dump> --profile=<profile> driverscanIdentifying Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Dumping Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing LDRModules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyating API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing CSRSS
volatility -f <memory_dump> --profile=<profile> csrss
Analyzing Print Spooler
volatility -f <memory_dump> --profile=<profile> printkey
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadwalk
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadlist
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Vad Trees
`volatility -f <memory_dump> --profile=
volatility --profile=PROFILE envars -f file.dmp [--pid <pid>] #Display process environment variables
volatility --profile=PROFILE -f file.dmp linux_psenv [-p <pid>] #Get env of process. runlevel var means the runlevel where the proc is initated令牌权限
检查意外服务中的特权令牌。 列出使用某些特权令牌的进程可能很有趣。
#Get enabled privileges of some processes
python3 vol.py -f file.dmp windows.privileges.Privs [--pid <pid>]
#Get all processes with interesting privileges
python3 vol.py -f file.dmp windows.privileges.Privs | grep "SeImpersonatePrivilege\|SeAssignPrimaryPrivilege\|SeTcbPrivilege\|SeBackupPrivilege\|SeRestorePrivilege\|SeCreateTokenPrivilege\|SeLoadDriverPrivilege\|SeTakeOwnershipPrivilege\|SeDebugPrivilege"Volatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljsonity -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive json -
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>File Extraction
volatility -f <memory_dump> --profile=<profile> filescan
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Driver Modules
volatility -f <memory_dump> --profile=<profile> driverscan
SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
UserAssist
voljsonity -f <memory_dump> --profile=<profile> userassist
Privileges
volatility -f <memory_dump> --profile=<profile> privs
Crash Dumps
volatility -f <memory_dump> --profile=<profile> crashinfo
Yara Scanning
volatility -f <memory_dump> --profile=<profile> yarascan --yara-file=<rules_file>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Dumping a Process
`volatility -f <memory_dump> --profile= memdump -p -D <
#Get enabled privileges of some processes
volatility --profile=Win7SP1x86_23418 privs --pid=3152 -f file.dmp | grep Enabled
#Get all processes with interesting privileges
volatility --profile=Win7SP1x86_23418 privs -f file.dmp | grep "SeImpersonatePrivilege\|SeAssignPrimaryPrivilege\|SeTcbPrivilege\|SeBackupPrivilege\|SeRestorePrivilege\|SeCreateTokenPrivilege\|SeLoadDriverPrivilege\|SeTakeOwnershipPrivilege\|SeDebugPrivilege"SIDs
检查每个进程拥有的SSID。 列出使用特权SID的进程(以及使用某些服务SID的进程)可能会很有趣。
./vol.py -f file.dmp windows.getsids.GetSIDs [--pid <pid>] #Get SIDs of processes
./vol.py -f file.dmp windows.getservicesids.GetServiceSIDs #Get the SID of servicesVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
voljson -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Advanced Commands
Analyzing a Process
volatility -f <memory_dump> --profile=<profile> pstree -p <pid>
Extracting DLLs json
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Plugin Development
Creating a New Plugin
Create a new Python file in the
volatility/pluginsdirectoryImplement the plugin using the Volatility API
Use the
vol.pycommand with the--pluginsoption to load the custom plugin
volatility --profile=Win7SP1x86_23418 getsids -f file.dmp #Get the SID owned by each process
volatility --profile=Win7SP1x86_23418 getservicesids -f file.dmp #Get the SID of each service句柄
有助于了解进程打开了哪些其他文件、密钥、线程、进程...
vol.py -f file.dmp windows.handles.Handles [--pid <pid>]Volatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
voljson -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Plugin Development
Creating a New Plugin
Refer to the official Volatility Plugin Development Guide
Compiling Plugins
python vol.py --plugins=<plugin_directory>
Using Custom Plugins
volatility --plugins=<custom_plugin_directory> -f <memory_dump> <custom_plugin_name>
volatility --profile=Win7SP1x86_23418 -f file.dmp handles [--pid=<pid>]DLLs
./vol.py -f file.dmp windows.dlllist.DllList [--pid <pid>] #List dlls used by each
./vol.py -f file.dmp windows.dumpfiles.DumpFiles --pid <pid> #Dump the .exe and dlls of the process in the current directory processVolatility Cheat Sheet
Basic Forensic Methodology
Memory Dump Analysis
Identify Profile:
vol.py -f memory_dump.raw imageinfoAnalyze Processes:
vol.py -f memory_dump.raw --profile=Win7SP1x64 pslistAnalyze DLLs:
vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllistAnalyze Handles:
vol.py -f memory_dump.raw --profile=Win7SP1x64 handlesAnalyze Registry:
vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"Analyze Network Connections:
vol.py -f memory_dump.raw --profile=Win7SP1x64 netscanAnalyze Drivers:
vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscanAnalyze Mutants:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscanAnalyze Sockets:
vol.py -f memory_dump.raw --profile=Win7SP1x64 socketsAnalyze Autostart Locations:
vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
File Analysis
Analyze MFT:
vol.py -f memory_dump.raw --profile=Win7SPjson1 mftparserAnalyze File Metadata:
vol.py -f memory_dump.raw --profile=Win7SP1x64 filescan
Timeline Analysis
Create Timeline:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mactime
Malware Analysis
Analyze Malware:
vol.py -f memory_dump.raw --profile=Win7SP1x64 malfind
Rootkit Detection
Detect Rootkits:
vol.py -f memory_dump.raw --profile=Win7SP1x64 rootkit
Memory Analysis
Analyze Memory:
vol.py -f memory_dump.raw --profile=Win7SP1x64 memmap
User Analysis
AnAnalyze Users:
vol.py -f memory_dump.raw --profile=Win7SP1x64 userassist
Registry Analysis
Analyze Registry:
vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
Network Analysis
Analyze Network:
vol.py -f memory_dump.raw --profile=Win7SP1x64 netscan
Process Analysis
Analyze Processes:
vol.py -f memory_dump.raw --profile=Win7SP1x64 pslist
DLL Analysis
Analyze DLLs:
vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllist
Handle Analysis
Analyze Handles:
vol.py -f memory_dump.raw --profile=Win7SP1x64 handles
Driver Analysis
Analyze Drivers:
vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscan
Mutant Analysis
Analyze Mutants:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscan
Socket Analysis
Analyze Sockets:
vol.py -f memory_dump.raw --profile=Win7SP1x64 sockets
Autostart Analysis
Analyze Autostart Locations:
vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
MFT Analysis
Analyze MFT:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mftparser
File Metadata Analysis
Analyze File Metadata:
vol.py -f memory_dump.raw --profile=Win7SP1x64 filescan
Timeline Creation
Create Timeline:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mactime
Malware Analysis
Analyze Malware:
vol.py -f memory_dump.raw --profile=Win7SP1x64 malfind
Rootkit Detection
Detect Rootkits:
vol.py -f memory_dump.raw --profile=Win7SP1x64 rootkit
Memory Analysis
Analyze Memory:
vol.py -f memory_dump.raw --profile=Win7SP1x64 memmap
User Analysis
Analyze Users:
vol.py -f memory_dump.raw --profile=Win7SP1x64 userassist
Registry Analysis
Analyze Registry:
vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
Network Analysis
Analyze Network:
vol.py -f memory_dump.raw --profile=Win7SP1x64 netscan
Process Analysis
Analyze Processes:
vol.py -f memory_dump.raw --profile=Win7SP1x64 pslist
DLL Analysis
Analyze DLLs:
vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllist
Handle Analysis
Analyze Handles:
vol.py -f memory_dump.raw --profile=Win7SP1x64 handles
Driver Analysis
Analyze Drivers:
vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscan
Mutant Analysis
Analyze Mutants:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscan
Socket Analysis
Analyze Sockets:
vol.py -f memory_dump.raw --profile=Win7SP1x64 sockets
Autostart Analysis
Analyze Autostart Locations:
vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
MFT Analysis
Analyze MFT:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mftparser
File Metadata Analysis
Analyze File Metadata:
vol.py -f memory_dump.raw --profile=Win7SP1x64 filescan
Timeline Creation
Create Timeline:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mactime
Malware Analysis
Analyze Malware:
vol.py -f memory_dump.raw --profile=Win7SP1x64 malfind
Rootkit Detection
Detect Rootkits:
vol.py -f memory_dump.raw --profile=Win7SP1x64 rootkit
Memory Analysis
Analyze Memory:
vol.py -f memory_dump.raw --profile=Win7SP1x64 memmap
User Analysis
Analyze Users:
vol.py -f memory_dump.raw --profile=Win7SP1x64 userassist
Registry Analysis
Analyze Registry:
vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
Network Analysis
Analyze Network:
vol.py -f memory_dump.raw --profile=Win7SP1x64 netscan
Process Analysis
Analyze Processes:
vol.py -f memory_dump.raw --profile=Win7SP1x64 pslist
DLL Analysis
Analyze DLLs:
vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllist
Handle Analysis
Analyze Handles:
vol.py -f memory_dump.raw --profile=Win7SP1x64 handles
Driver Analysis
Analyze Drivers:
vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscan
Mutant Analysis
Analyze Mutants:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscan
Socket Analysis
Analyze Sockets:
vol.py -f memory_dump.raw --profile=Win7SP1x64 sockets
Autostart Analysis
Analyze Autostart Locations:
vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
MFT Analysis
Analyze MFT:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mftparser
File Metadata Analysis
Analyze File Metadata:
vol.py -f memory_dump.raw --profile=Win7SP1x64 filescan
Timeline Creation
Create Timeline:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mactime
Malware Analysis
Analyze Malware:
vol.py -f memory_dump.raw --profile=Win7SP1x64 malfind
Rootkit Detection
Detect Rootkits:
vol.py -f memory_dump.raw --profile=Win7SP1x64 rootkit
Memory Analysis
Analyze Memory:
vol.py -f memory_dump.raw --profile=Win7SP1x64 memmap
User Analysis
Analyze Users:
vol.py -f memory_dump.raw --profile=Win7SP1x64 userassist
Registry Analysis
Analyze Registry:
vol.py -f memory_dump.raw --profile=Win7SP1x64 printkey -K "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
Network Analysis
Analyze Network:
vol.py -f memory_dump.raw --profile=Win7SP1x64 netscan
Process Analysis
Analyze Processes:
vol.py -f memory_dump.raw --profile=Win7SP1x64 pslist
DLL Analysis
Analyze DLLs:
vol.py -f memory_dump.raw --profile=Win7SP1x64 dlllist
Handle Analysis
Analyze Handles:
vol.py -f memory_dump.raw --profile=Win7SP1x64 handles
Driver Analysis
Analyze Drivers:
vol.py -f memory_dump.raw --profile=Win7SP1x64 driverscan
Mutant Analysis
Analyze Mutants:
vol.py -f memory_dump.raw --profile=Win7SP1x64 mutantscan
Socket Analysis
Analyze Sockets:
vol.py -f memory_dump.raw --profile=Win7SP1x64 sockets
Autostart Analysis
Analyze Autostart Locations:
vol.py -f memory_dump.raw --profile=Win7SP1x64 autoruns
volatility --profile=Win7SP1x86_23418 dlllist --pid=3152 -f file.dmp #Get dlls of a proc
volatility --profile=Win7SP1x86_23418 dlldump --pid=3152 --dump-dir=. -f file.dmp #Dump dlls of a proc每个进程的字符串
Volatility允许我们检查一个字符串属于哪个进程。
strings file.dmp > /tmp/strings.txt
./vol.py -f /tmp/file.dmp windows.strings.Strings --strings-file /tmp/strings.txtVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
voljson -f <memory_dump> --profile=<profile> netscan
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> --dump-dir=<output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry json
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers
voljson -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Mutantscan
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Yarascan
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Privilege Rights
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Kernel Hooks
volatility -f <memory_dump> --profile=<profile> kdbgscan
Analyzing Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Analyzing GDI Tables
volatility -f <memory_dump> --profile=<profile> gditimers
Analyzing GDI Shared Handles
volatility -f <memory_dump> --profile=<profile> gdiview
Analyzing GDI Objects
volatility -f <memory_dump> --profile=<profile> gdiobjects
Analyzing Atom Tables
volatility -f <memory_dump> --profile=<profile> atomscan
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Windows Stations
volatility -f <memory_dump> --profile=<profile> windows
Analyzing Sessions
volatility -f <memory_dump> --profile=<profile> sessions
Analyzing Printers
volatility -f <memory_dump> --profile=<profile> printers
Analyzing Shimcache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing TrueCrypt Keys
volatility -f <memory_dump> --profile=<profile> truecryptmaster
Analyzing Bitlocker Keys
volatility -f <memory_dump> --profile=<profile> bitlockermemory
Analyzing LUKS Keys
volatility -f <memory_dump> --profile=<profile> luksmeta
Analyzing Chrome Extensions
volatility -f <memory_dump> --profile=<profile> chromehistory
Analyzing Firefox Extensions
volatility -f <memory_dump> --profile=<profile> firefoxhistory
Analyzing IE History
volatility -f <memory_dump> --profile=<profile> iehistory
Analyzing LSA Secrets
volatility -f <memory_dump> --profile=<profile> lsadump
Analyizing Hashdump
volatility -f <memory_dump> --profile=<profile> hashdump
Analyzing User Assist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MBR
volatility -f <memory_dump> --profile=<profile> mbrparser
Analyzing VBR
volatility -f <memory_dump> --profile=<profile> vbrparser
Analyzing Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing User Profiles
volatility -f <memory_dump> --profile=<profile> userprofiles
Analyzing PEB
volatility -f <memory_dump> --profile=<profile> peb
Analyzing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyizing Privilege Rights
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Kernel Hooks
volatility -f <memory_dump> --profile=<profile> kdbgscan
Analyzing Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Analyzing GDI Tables
volatility -f <memory_dump> --profile=<profile> gditimers
Analyzing GDI Shared Handles
volatility -f <memory_dump> --profile=<profile> gdiview
Analyzing GDI Objects
volatility -f <memory_dump> --profile=<profile> gdiobjects
Analyzing Atom Tables
volatility -f <memory_dump> --profile=<profile> atomscan
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Windows Stations
volatility -f <memory_dump> --profile=<profile> windows
Analyzing Sessions
volatility -f <memory_dump> --profile=<profile> sessions
Analyzing Printers
volatility -f <memory_dump> --profile=<profile> printers
Analyzing Shimcache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing TrueCrypt Keys
volatility -f <memory_dump> --profile=<profile> truecryptmaster
Analyzing Bitlocker Keys
volatility -f <memory_dump> --profile=<profile> bitlockermemory
Analyzing LUKS Keys
volatility -f <memory_dump> --profile=<profile> luksmeta
Analyzing Chrome Extensions
volatility -f <memory_dump> --profile=<profile> chromehistory
Analyzing Firefox Extensions
volatility -f <memory_dump> --profile=<profile> firefoxhistory
Analyzing IE History
volatility -f <memory_dump> --profile=<profile> iehistory
Analyzing LSA Secrets
volatility -f <memory_dump> --profile=<profile> lsadump
Analyzing Hashdump
volatility -f <memory_dump> --profile=<profile> hashdump
Analyzing User Assist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MBR
volatility -f <memory_dump> --profile=<profile> mbrparser
Analyzing VBR
volatility -f <memory_dump> --profile=<profile> vbrparser
Analyzing Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing User Profiles
volatility -f <memory_dump> --profile=<profile> userprofiles
Analyzing PEB
volatility -f <memory_dump> --profile=<profile> peb
Analyzing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyizing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Privilege Rights
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Kernel Hooks
volatility -f <memory_dump> --profile=<profile> kdbgscan
Analyzing Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Analyzing GDI Tables
volatility -f <memory_dump> --profile=<profile> gditimers
Analyzing GDI Shared Handles
volatility -f <memory_dump> --profile=<profile> gdiview
Analyzing GDI Objects
volatility -f <memory_dump> --profile=<profile> gdiobjects
Analyzing Atom Tables
volatility -f <memory_dump> --profile=<profile> atomscan
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Windows Stations
volatility -f <memory_dump> --profile=<profile> windows
Analyzing Sessions
volatility -f <memory_dump> --profile=<profile> sessions
Analyizing Printers
volatility -f <memory_dump> --profile=<profile> printers
Analyzing Shimcache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing TrueCrypt Keys
volatility -f <memory_dump> --profile=<profile> truecryptmaster
Analyzing Bitlocker Keys
volatility -f <memory_dump> --profile=<profile> bitlockermemory
Analyzing LUKS Keys
volatility -f <memory_dump> --profile=<profile> luksmeta
Analyzing Chrome Extensions
volatility -f <memory_dump> --profile=<profile> chromehistory
Analyzing Firefox Extensions
volatility -f <memory_dump> --profile=<profile> firefoxhistory
Analyzing IE History
volatility -f <memory_dump> --profile=<profile> iehistory
Analyzing LSA Secrets
volatility -f <memory_dump> --profile=<profile> lsadump
Analyzing Hashdump
volatility -f <memory_dump> --profile=<profile> hashdump
Analyzing User Assist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing MBR
volatility -f <memory_dump> --profile=<profile> mbrparser
Analyzing VBR
volatility -f <memory_dump> --profile=<profile> vbrparser
Analyzing Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing User Profiles
volatility -f <memory_dump> --profile=<profile> userprofiles
Analyzing PEB
volatility -f <memory_dump> --profile=<profile> peb
Analyzing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyizing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
`volatility -f <memory_dump> --profile=<profile
strings file.dmp > /tmp/strings.txt
volatility -f /tmp/file.dmp windows.strings.Strings --string-file /tmp/strings.txt
volatility -f /tmp/file.dmp --profile=Win81U1x64 memdump -p 3532 --dump-dir .
strings 3532.dmp > strings_file它还允许使用yarascan模块在进程内搜索字符串:
./vol.py -f file.dmp windows.vadyarascan.VadYaraScan --yara-rules "https://" --pid 3692 3840 3976 3312 3084 2784
./vol.py -f file.dmp yarascan.YaraScan --yara-rules "https://"Volatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
voljsonity -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> printkey -K <registry_key>
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers json -
volatility -f <memory_dump> --profile=<profile> driverscanIdentifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Crashes
volatility -f <memory_dump> --profile=<profile> pslist
Analyzing Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Analyizing ImpHash
volatility -f <memory_dump> --profile=<profile> impscan
Analyzing API Audit
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Trace
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Monitor
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
volatility --profile=Win7SP1x86_23418 yarascan -Y "https://" -p 3692,3840,3976,3312,3084,2784UserAssist
Windows 在注册表中使用名为 UserAssist keys 的功能来跟踪您运行的程序。这些键记录每个程序被执行的次数以及上次运行的时间。
./vol.py -f file.dmp windows.registry.userassist.UserAssistVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
voljson -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Advanced Commands
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malfind
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Timelining
volatility -f <memory_dump> --profile=<profile> timeliner
Plugin Options
Using Specific Plugin
volatility -f <memory_dump> --profile=<profile> <plugin_name>
Plugin Help
volatility --info | grep <plugin_name>
Plugin Options
volatility --info | grep <plugin_name> -A <number_of_lines>
volatility --profile=Win7SP1x86_23418 -f file.dmp userassist

RootedCON 是西班牙最重要的网络安全活动之一,也是欧洲最重要的之一。作为促进技术知识的使命,这个大会是技术和网络安全专业人士在各个领域的热点交流会。
服务
./vol.py -f file.dmp windows.svcscan.SvcScan #List services
./vol.py -f file.dmp windows.getservicesids.GetServiceSIDs #Get the SID of services在进行内存转储分析时,以下是一些常用的Volatility命令和技巧:
查看进程列表:
volatility -f <memory_dump> --profile=<profile> pslist查看网络连接:
volatility -f <memory_dump> --profile=<profile> netscan查看注册表信息:
volatility -f <memory_dump> --profile=<profile> printkey -K <registry_key>查看文件信息:
volatility -f <memory_dump> --profile=<profile> filescan
记住,使用适当的插件和配置文件来确保分析的准确性和完整性。
#Get services and binary path
volatility --profile=Win7SP1x86_23418 svcscan -f file.dmp
#Get name of the services and SID (slow)
volatility --profile=Win7SP1x86_23418 getservicesids -f file.dmp网络
./vol.py -f file.dmp windows.netscan.NetScan
#For network info of linux use volatility2Volatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Listing Sockets
voljson -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive json-
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>File Extraction
volatility -f <memory_dump> --profile=<profile> filescan | grep -i <file_extension>
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Rootkit Detection
volatility -f <memory_dump> --profile=<profile> malfind
Process Tree
volatility -f <memory_dump> --profile=<profile> pstree
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Account Information
volatility -f <memory_dump> --profile=<profile> userassist
Screen Capture
volatility -f <memory_dump> --profile=<profile> screenshot -D <output_directory>
Kernel Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Crash Dump Analysis
volatility -f <memory_dump> --profile=<profile> ldrmodules
API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden IDT Hooks
voljson -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> handles
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irp
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden UDP Ports
volatility -f <memory_dump> --profile=<profile> connscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden Notified Routines
volatility -f <memory_dump> --profile=<profile> notifys
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden Services
`volatility -f <memory_dump> --profile=<profile
volatility --profile=Win7SP1x86_23418 netscan -f file.dmp
volatility --profile=Win7SP1x86_23418 connections -f file.dmp#XP and 2003 only
volatility --profile=Win7SP1x86_23418 connscan -f file.dmp#TCP connections
volatility --profile=Win7SP1x86_23418 sockscan -f file.dmp#Open sockets
volatility --profile=Win7SP1x86_23418 sockets -f file.dmp#Scanner for tcp socket objects
volatility --profile=SomeLinux -f file.dmp linux_ifconfig
volatility --profile=SomeLinux -f file.dmp linux_netstat
volatility --profile=SomeLinux -f file.dmp linux_netfilter
volatility --profile=SomeLinux -f file.dmp linux_arp #ARP table
volatility --profile=SomeLinux -f file.dmp linux_list_raw #Processes using promiscuous raw sockets (comm between processes)
volatility --profile=SomeLinux -f file.dmp linux_route_cache注册表文件
打印可用的注册表文件
./vol.py -f file.dmp windows.registry.hivelist.HiveList #List roots
./vol.py -f file.dmp windows.registry.printkey.PrintKey #List roots and get initial subkeysVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
voljson -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting Files
volatility -f <memory_dump> --profile=<profile> filescanvolatility -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Process Memory
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Identifying Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Analyzing Timelining
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing Packed Binaries
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Registry Transactions
volatility -f <memory_dump> --profile=<profile> printkey -K <key>
Analyzing User Assist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing TrueCrypt Keys
volatility -f <memory_dump> --profile=<profile> truecryptmaster
Analyzing LUKS Keys
volatility -f <memory_dump> --profile=<profile> luksmeta
Analyzing Bitlocker Keys
volatility -f <memory_dump> --profile=<profile> bitlocker
Analyzing Chrome Extensions
volatility -f <memory_dump> --profile=<profile> chromehistory
Analyzing Firefox Extensions
volatility -f <memory_dump> --profile=<profile> firefoxhistory
Analyzing Internet Explorer History
volatility -f <memory_dump> --profile=<profile> iehistory
Analyzing Outlook Memory
volatility -f <memory_dump> --profile=<profile> outlook
Analyzing Thunderbird Memory
volatility -f <memory_dump> --profile=<profile> thunderbird
Analyzing Skype Memory
volatility -f <memory_dump> --profile=<profile> skype
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
Analyzing Telegram Memory
volatility -f <memory_dump> --profile=<profile> telegram
Analyzing Slack Memory
volatility -f <memory_dump> --profile=<profile> slack
Analyzing Discord Memory
volatility -f <memory_dump> --profile=<profile> discord
Analyzing Signal Memory
volatility -f <memory_dump> --profile=<profile> signal
Analyzing WhatsApp Memory
volatility -f <memory_dump> --profile=<profile> whatsapp
Analyzing Viber Memory
volatility -f <memory_dump> --profile=<profile> viber
Analyzing Facebook Messenger Memory
volatility -f <memory_dump> --profile=<profile> facebookmessenger
Analyzing Instagram Memory
volatility -f <memory_dump> --profile=<profile> instagram
Analyzing Snapchat Memory
volatility -f <memory_dump> --profile=<profile> snapchat
Analyzing TikTok Memory
volatility -f <memory_dump> --profile=<profile> tiktok
Analyzing WeChat Memory
volatility -f <memory_dump> --profile=<profile> wechat
Analyzing Line Memory
volatility -f <memory_dump> --profile=<profile> line
Analyzing Kik Memory
volatility -f <memory_dump> --profile=<profile> kik
volatility --profile=Win7SP1x86_23418 -f file.dmp hivelist #List roots
volatility --profile=Win7SP1x86_23418 -f file.dmp printkey #List roots and get initial subkeys获取数值
./vol.py -f file.dmp windows.registry.printkey.PrintKey --key "Software\Microsoft\Windows NT\CurrentVersion"Volatility Cheatsheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
voljson -f <memory_dump> --profile=<profile> dlllist
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive
volvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
File Extraction
volatility -f <memory_dump> --profile=<profile> filescan
Dumping a File json -f <memory_dump> --profile= dumpfiles -Q <physical_offset> -D <output_directory>`
Kernel Driver Analysis
volatility -f <memory_dump> --profile=<profile> driverscan
Dumping Kernel Driver
volatility -f <memory_dump> --profile=<profile> moddump -o <offset> -D <output_directory>
Process Tree
volatility -f <memory_dump> --profile=<profile> pstree
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Accounts
volatility -f <memory_dump> --profile=<profile> useraccounts
Dumping SAM
volatility -f <memory_dump> --profile=<profile> hashdump -y <offset>
Crash Dump Analysis
volatility -f <memory_dump> --profile=<profile> memmap
Advanced Commands
Rootkit Detection
volatility -f <memory_dump> --profile=<profile> malfind
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Detecting Hidden Files
volatility -f <memory_dump> --profile=<profile> filescan
Detecting Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivescan
Detecting Hidden Drivers
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden Objects
volatility -f <memory_dump> --profile=<profile> callbacks
Detecting Hidden IRPs
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Detecting Hidden TCP/IP Hooks
volatility -f <memory_dump> --profile=<profile> tcpip
Detecting Hidden Token Objects
volatility -f <memory_dump> --profile=<profile> tokens
Detecting Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Detecting Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Detecting Hidden SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Detecting Hidden IRP Hooks
volatility -f <memory_dump> --profile=<profile> irpfind
Detecting Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
**Detecting
volatility --profile=Win7SP1x86_23418 printkey -K "Software\Microsoft\Windows NT\CurrentVersion" -f file.dmp
# Get Run binaries registry value
volatility -f file.dmp --profile=Win7SP1x86 printkey -o 0x9670e9d0 -K 'Software\Microsoft\Windows\CurrentVersion\Run'转储
#Dump a hive
volatility --profile=Win7SP1x86_23418 hivedump -o 0x9aad6148 -f file.dmp #Offset extracted by hivelist
#Dump all hives
volatility --profile=Win7SP1x86_23418 hivedump -f file.dmp文件系统
挂载
#See vol2Volatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
voljson -f <memory_dump> --profile=<profile> dlllist
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Accounts
voljson -f <memory_dump> --profile=<profile> useraccounts
Dumping a File json
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Advanced Commands
Process Tree
volatility -f <memory_dump> --profile=<profile> pstree
Kernel Drivers json
volatility -f <memory_dump> --profile=<profile> driverscan
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Rootkits
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Timelime
volatility -f <memory_dump> --profile=<profile> timeliner
Extracting Files
volatility -f <memory_dump> --profile=<profile> filescanvolatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Dumping Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Network Packets
volatility -f <memory_dump> --profile=<profile> netscan
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Registry Handles
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Services
volatility -f <memory_dump> --profile=<profile> svcscan
Analyzing TCP Connections
volatility -f <memory_dump> --profile=<profile> connscan
Analyzing User Sessions
volatility -f <memory_dump> --profile=<profile> sessions
Analyzing Windows
volatility -f <memory_dump> --profile=<profile> windows
Analyzing WMI
volatility -f <memory_dump> --profile=<profile> wmiscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing Zipped Files
volatility -f <memory_dump> --profile=<profile> zipscan
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volvolatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
Analyzing Suspicious Files
volatility -f <memory_dump> --profile=<profile> malfile
Analyzing Suspicious Processes
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Suspicious Drivers
volatility -f <memory_dump> --profile=<profile> malsysdrivers
Analyzing Suspicious Modules
volatility -f <memory_dump> --profile=<profile> malsysmodules
Analyzing Suspicious Services
volatility -f <memory_dump> --profile=<profile> malsvcs
Analyzing Suspicious Registry Keys
volatility -f <memory_dump> --profile=<profile> malreg
Analyzing Suspicious Network Connections
volatility -f <memory_dump> --profile=<profile> malnet
volatility --profile=SomeLinux -f file.dmp linux_mount
volatility --profile=SomeLinux -f file.dmp linux_recover_filesystem #Dump the entire filesystem (if possible)扫描/转储
./vol.py -f file.dmp windows.filescan.FileScan #Scan for files inside the dump
./vol.py -f file.dmp windows.dumpfiles.DumpFiles --physaddr <0xAAAAA> #Offset from previous commandVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
voljson -f <memory_dump> --profile=<profile> netscan
Dumping a File
volatility -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Advanced Commands
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscanvolatility -f <memory_dump> --profile=<profile> moddump -o <offset> -D <output_directory>
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> drvscan
Analyating Packed Binaries
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Timelining
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handle
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Analyzing Process Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Pools
voljson -f <memory_dump> --profile=<profile> poolscanner
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process Dump
volatility -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
volatility --profile=Win7SP1x86_23418 filescan -f file.dmp #Scan for files inside the dump
volatility --profile=Win7SP1x86_23418 dumpfiles -n --dump-dir=/tmp -f file.dmp #Dump all files
volatility --profile=Win7SP1x86_23418 dumpfiles -n --dump-dir=/tmp -Q 0x000000007dcaa620 -f file.dmp
volatility --profile=SomeLinux -f file.dmp linux_enumerate_files
volatility --profile=SomeLinux -f file.dmp linux_find_file -F /path/to/file
volatility --profile=SomeLinux -f file.dmp linux_find_file -i 0xINODENUMBER -O /path/to/dump/file主文件表
# I couldn't find any plugin to extract this information in volatility3Volatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljson -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping a Registry Hive
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting Files
volatility -f <memory_dump> --profile=<profile> filescan --dump-dir=<output_directory>
Analyzing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Drivers
voljson -f <memory_dump> --profile=<profile> drvmap
Analyzing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Timers
volatility -f <memory_dump> --profile=<profile> timers
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing LDRModules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing CSRSS
volatility -f <memory_dump> --profile=<profile> csrss
Analyzing Print Spooler
volatility -f <memory_dump> --profile=<profile> printkey
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyizing User Sessions
volatility -f <memory_dump> --profile=<profile> users
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Driver Modules
volatility -f <memory_dump> --profile=<profile> modules
Analyzing SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing IDT Hooks
volatility -f <memory_dump> --profile=<profile> idt
Analyzing IRP Hooks
volatility -f <memory_dump> --profile=<profile> irp
Analyzing Hidden Modules
volatility -f <memory_dump> --profile=<profile> modscan
Analyzing Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Hidden Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Hidden Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Hidden Ports
volatility -f <memory_dump> --profile=<profile> port
Analyzing Hidden Devices
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Hidden Services
volatility -f <memory_dump> --profile=<profile> svcscan
Analyzing Hidden Timers
volatility -f <memory_dump> --profile=<profile> timers
Analyzing Hidden Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Hidden Notepad
volatility -f <memory_dump> --profile=<profile> notepad
Analyzing Hidden Registry Keys
volatility -f <memory_dump> --profile=<profile> hivelist
Analyzing Hidden Registry Values
volatility -f <memory_dump> --profile=<profile> printkey
Analyzing Hidden Registry Data
volatility -f <memory_dump> --profile=<profile> hivedump
Analyzing Hidden Registry Handles
volatility -f <memory_dump> --profile=<profile> hivelist
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Hidden Registry RecentFileCache
volatility -f <memory_dump> --profile=<profile> recentfilecache
Analyzing Hidden Registry AppCompatCache
volatility -f <memory_dump> --profile=<profile> appcompatcache
Analyzing Hidden Registry Amcache
volatility -f <memory_dump> --profile=<profile> amcache
Analyzing Hidden Registry BAM
volatility -f <memory_dump> --profile=<profile> bam
Analyzing Hidden Registry UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing Hidden Registry ShimCache
`volatility -
volatility --profile=Win7SP1x86_23418 mftparser -f file.dmpNTFS文件系统使用一个关键组件,称为_主文件表_(MFT)。该表至少包含卷上每个文件的一个条目,也包括MFT本身。关于每个文件的重要细节,如大小、时间戳、权限和实际数据,都封装在MFT条目中或在MFT外部但由这些条目引用的区域中。更多详细信息可以在官方文档中找到。
SSL密钥/证书
#vol3 allows to search for certificates inside the registry
./vol.py -f file.dmp windows.registry.certificates.CertificatesVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljson -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping a Registry Hive json
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting Files
volatility -f <memory_dump> --profile=<profile> filescanvolatility -f <memory_dump> --profile=<profile> dumpfiles -Q <physical_offset> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Identifying Kernel Modules
voljson -f <memory_dump> --profile=<profile> modscan
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Timelining
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing LDRModules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vadtree
Analyzing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing Crashes
volatility -f <memory_dump> --profile=<profile> crashinfo
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing User Sessions
volatility -f <memory_dump> --profile=<profile> users
Analyzing Registry Handles
volatility -f <memory_dump> --profile=<profile> hivelist
Analyzing Registry Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyjsoning Registry Keys
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Binaries
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Values
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Data
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Lists
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Timelining
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Analyzing Registry Key Usage
`volatility -
#vol2 allos you to search and dump certificates from memory
#Interesting options for this modules are: --pid, --name, --ssl
volatility --profile=Win7SP1x86_23418 dumpcerts --dump-dir=. -f file.dmp恶意软件
./vol.py -f file.dmp windows.malfind.Malfind [--dump] #Find hidden and injected code, [dump each suspicious section]
#Malfind will search for suspicious structures related to malware
./vol.py -f file.dmp windows.driverirp.DriverIrp #Driver IRP hook detection
./vol.py -f file.dmp windows.ssdt.SSDT #Check system call address from unexpected addresses
./vol.py -f file.dmp linux.check_afinfo.Check_afinfo #Verifies the operation function pointers of network protocols
./vol.py -f file.dmp linux.check_creds.Check_creds #Checks if any processes are sharing credential structures
./vol.py -f file.dmp linux.check_idt.Check_idt #Checks if the IDT has been altered
./vol.py -f file.dmp linux.check_syscall.Check_syscall #Check system call table for hooks
./vol.py -f file.dmp linux.check_modules.Check_modules #Compares module list to sysfs info, if available
./vol.py -f file.dmp linux.tty_check.tty_check #Checks tty devices for hooksVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing DLLs
voljson -f <memory_dump> --profile=<profile> dlllist
Dumping a DLL
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Listing Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping Registry Hive
voljson -f <memory_dump> --profile=<profile> printkey -o <output_directory>
File Analysis
volatility -f <memory_dump> --profile=<profile> filescan
Dumping a File json -f <memory_dump> --profile= dumpfiles -Q <address_range> -D <output_directory>`
Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Dumping a Kernel Module
volatility -f <memory_dump> --profile=<profile> moddump -p <pid> -D <output_directory>
Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Command History
volatility -f <memory_dump> --profile=<profile> cmdscan
User Accounts
volatility -f <memory_dump> --profile=<profile> useraccounts
Screenshots
volatility -f <memory_dump> --profile=<profile> screenshot -D <output_directory>
Yara Scanning
volatility -f <memory_dump> --profile=<profile> yarascan --yara-file=<rules_file>
API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Detecting Hidden Drivers json -f <memory_dump> --profile= ldrmodules`
Detecting Hidden DLLs
volatility -f <memory_dump> --profile=<profile> ldrmodules
Detecting Hidden TCP/UDP Ports
volatility -f <memory_dump> --profile=<profile> portscan
Detecting Rootkits
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Malware
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Injection
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Modules
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Strings
volatility -f <memory_dump> --profile=<profile> strings
Detecting In-Memory Code
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Rootkits
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Mutexes
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Processes
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Services
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Timers
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Windows
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Handles
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory IRPs
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory SSDT Hooks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Imports
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Unload
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Start
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Sections
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Registry
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver IRPs
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Handles
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Functions
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Objects
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Stacks
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Names
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Extensions
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Characteristics
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Flags
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Security
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Policy
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Capabilities
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power State
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Type
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Level
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags2
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags3
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags4
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags5
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags6
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags7
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags8
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags9
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags10
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags11
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags12
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags13
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags14
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags15
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags16
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags17
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags18
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags19
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags20
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags21
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags22
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags23
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags24
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags25
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags26
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags27
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags28
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags29
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags30
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags31
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags32
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags33
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags34
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags35
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags36
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags37
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags38
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags39
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags40
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags41
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags42
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags43
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags44
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags45
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags46
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags47
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags48
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags49
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags50
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags51
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags52
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags53
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags54
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags55
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags56
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags57
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags58
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags59
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags60
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags61
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags62
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags63
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags64
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags65
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags66
volatility -f <memory_dump> --profile=<profile> malfind
Detecting In-Memory Driver Device Power Shutdown Flags67
`volatility -f <memory_dump> --profile= m
volatility --profile=Win7SP1x86_23418 -f file.dmp malfind [-D /tmp] #Find hidden and injected code [dump each suspicious section]
volatility --profile=Win7SP1x86_23418 -f file.dmp apihooks #Detect API hooks in process and kernel memory
volatility --profile=Win7SP1x86_23418 -f file.dmp driverirp #Driver IRP hook detection
volatility --profile=Win7SP1x86_23418 -f file.dmp ssdt #Check system call address from unexpected addresses
volatility --profile=SomeLinux -f file.dmp linux_check_afinfo
volatility --profile=SomeLinux -f file.dmp linux_check_creds
volatility --profile=SomeLinux -f file.dmp linux_check_fop
volatility --profile=SomeLinux -f file.dmp linux_check_idt
volatility --profile=SomeLinux -f file.dmp linux_check_syscall
volatility --profile=SomeLinux -f file.dmp linux_check_modules
volatility --profile=SomeLinux -f file.dmp linux_check_tty
volatility --profile=SomeLinux -f file.dmp linux_keyboard_notifiers #Keyloggers使用yara进行扫描
使用此脚本从github下载并合并所有yara恶意软件规则:https://gist.github.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9 创建名为_rules的目录并执行该脚本。这将创建一个名为malware_rules.yar_的文件,其中包含所有恶意软件的yara规则。
wget https://gist.githubusercontent.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9/raw/4ec711d37f1b428b63bed1f786b26a0654aa2f31/malware_yara_rules.py
mkdir rules
python malware_yara_rules.py
#Only Windows
./vol.py -f file.dmp windows.vadyarascan.VadYaraScan --yara-file /tmp/malware_rules.yar
#All
./vol.py -f file.dmp yarascan.YaraScan --yara-file /tmp/malware_rules.yarVolatility Cheat Sheet
Basic Forensic Methodology
Memory Dump Acquisition
Physical Memory Dump:
dd if=/dev/mem of=/path/to/imageCrash Dump:
copy /y c:\windows\memory.dmp c:\path\to\imageHibernation File:
copy /y c:\hiberfil.sys c:\path\to\image
Memory Dump Analysis
Identify Profile:
volatility -f <dump> imageinfoList Processes:
volatility -f <dump> --profile=<profile> pslistDump Process:
volatility -f <dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Network Analysis
Connections:
volatility -f <dump> --profile=<profile> connscanSockets:
volatility -f <dump> --profile=<profile> socketsHTTP Sessions:
volatility -f <dump> --profile=<profile> volatilitfy -f <dump> --profile=<profile> netscan
File Analysis
File Listing:
volatility -f <dump> --profile=<profile> filescanDump File:
volatility -f <dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Registry Analysis
User Listing:
volatility -f <dump> --profile=<profile> hivelistDump Registry Hive:
voljson -f <dump> --profile=<profile> printkey -o <output_directory> -K <registry_key>
Malware Analysis
Detect Hidden Processes:
volatility -f <dump> --profile=<profile> psxviewjsonDetect Hidden Modules:
volatility -f <dump> --profile=<profile> ldrmodules
Timeline Analysis
Show Timelines:
volatility -f <dump> --profile=<profile> timelinerAnalyze Timelines:
volatility -f <dump> --profile=<profile> mactime
Other Useful Commands
API Hooks:
volatility -f <dump> --profile=<profile> apihooksDriver Modules:
volatility -f <dump> --profile=<profile> modulesSSDT Hooks:
volatility -f <dump> --profile=<profile> ssdt
wget https://gist.githubusercontent.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9/raw/4ec711d37f1b428b63bed1f786b26a0654aa2f31/malware_yara_rules.py
mkdir rules
python malware_yara_rules.py
volatility --profile=Win7SP1x86_23418 yarascan -y malware_rules.yar -f ch2.dmp | grep "Rule:" | grep -v "Str_Win32" | sort | uniq其他
外部插件
如果要使用外部插件,请确保与插件相关的文件夹是第一个参数使用的内容。
./vol.py --plugin-dirs "/tmp/plugins/" [...]Volatility Cheat Sheet
Basic Memory Analysis
List processes:
volatility -f <memory_dump> --profile=<profile> pslistDump a process:
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>List loaded drivers:
volatility -f <memory_dump> --profile=<profile> ldrmodulesList open network connections:
volatility -f <memory_dump> --profile=<profile> connectionsRecover deleted files:
volatility -f <memory_dump> --profile=<profile> filescan
Malware Analysis
Detect rootkits:
volatility -f <memory_dump> --profile=<profile> ldrmodulesIdentify injected code:
voljson -f <memory_dump> --profile=<profile> malfind
User Analysis
List user accounts:
volatility -f <memory_dump> --profile=<profile> useraccountsRetrieve user passwords:
volatility -f <memory_dump> --profile=<profile> hashdump
Network Analysis
Analyze network packets:
volatility -f <memory_dump> --profile=<profile> netscan
Timeline Analysis
Create a timeline of events:
volatility -f <memory_dump> --profile=<profile> timeliner
Plugin Development
Develop custom plugins: Volatility Plugin Development
Memory Forensics Resources
Official Volatility Documentation: Volatility Documentation
Memory Forensics Cheat Sheet: Memory Forensics Cheat Sheet
volatilitye --plugins="/tmp/plugins/" [...]Autoruns
从https://github.com/tomchop/volatility-autoruns下载。
volatility --plugins=volatility-autoruns/ --profile=WinXPSP2x86 -f file.dmp autoruns互斥体
./vol.py -f file.dmp windows.mutantscan.MutantScanVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
volmemory_dump> --profile=<profile> file -S <start_address> -E <end_address> -D <output_directory>
Registry Analysis
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Identifying Hidden Modules
voljson --output=json
Analyzing Kernel Modules
volatility -f <memory_dump> --profile=<profile> modscan
Extracting Kernel Drivers
volatility -f <memory_dump> --profile=<profile> moddump -D <output_directory>
Analyzing Timelining Information
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing Suspicious Binaries
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyizing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles -p <pid>
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads -p <pid>
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Environment Variables
volatility -f <memory_dump> --profile=<profile> envars -p <pid>
Analyzing Process Memory Map
volatility -f <memory_dump> --profile=<profile> memmap -p <pid>
volatility --profile=Win7SP1x86_23418 mutantscan -f file.dmp
volatility --profile=Win7SP1x86_23418 -f file.dmp handles -p <PID> -t mutant符号链接
./vol.py -f file.dmp windows.symlinkscan.SymlinkScanVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
voljson -f <memory_dump> --profile=<profile> procdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelist
Dumping a Registry Hive json
volatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Extracting Files
volatility -f <memory_dump> --profile=<profile> filescan | grep -i <file_extension>
Dumping LSA Secrets
volatility -f <memory_dump> --profile=<profile> lsadump
Dumping SAM
volatility -f <memory_dump> --profile=<profile> hashdump
Dumping Cached Credentials
volatility -f <memory_dump> --profile=<profile> cachedump
Analyzing ShimCache
volatility -f <memory_dump> --profile=<profile> shimcache
Analyzing Shellbags
volatility -f <memory_dump> --profile=<profile> shellbags
Analyzing UserAssist
volatility -f <memory_dump> --profile=<profile> userassist
Analyzing MFT
volatility -f <memory_dump> --profile=<profile> mftparser
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malsysproc
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Services
volatility -f <memory_dump> --profile=<profile> svcscan
Analyzing Timeliner
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyizing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing CSRSS
volatility -f <memory_dump> --profile=<profile> csrss
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Audit
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing Callbacks
volatility -f <memory_dump> --profile=<profile> callbacks
Analyzing SSDT Hooks
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing IRP Hooks
volatility -f <memory_dump> --profile=<profile> irp
Analyizing Scanning Modules
volatility -f <memory_dump> --profile=<profile> modscan
Analyzing Kernel Modules
volvolatility -f <memory_dump> --profile=<profile> moddump -D <output_directory>
Analyzing Kernel Drivers
volatility -f <memory_dump> --profile=<profile> kdbgscan
Analyizing Kernel Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Callbacks
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Handles
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Objects
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Modules
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Sections
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Imports
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Exports
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Pools
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Allocations
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyizing Kernel Driver Unloads
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver Timers
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Handlers
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Callers
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Devices
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Queues
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Pending
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Completed
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Canceled
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Read
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Write
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Device Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyizing Kernel Driver IRP Close
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Cleanup
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Create
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query EA
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyizing Kernel Driver IRP Set EA
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Flush
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Volume Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Volume Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Directory Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP File System Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Device Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Internal Device Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Shutdown
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Lock Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Cleanup
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Create Mailslot
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Security
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Security
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP System Control
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Device Change
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Quota
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Quota
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Device Relations
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Interface
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query PNP Device State
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Bus Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Device Text
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query ID
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Device Relations
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Resources
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Resource Requirements
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Legacy Bus Information
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Device Usage Notification
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Surprise Removal
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Query Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Set Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Others
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Unknown
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyizing Kernel Driver IRP Min
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Unknown
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Unknown
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Others
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Others
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Set Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Set Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max Query Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min Query Power
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Min WMI
volatility -f <memory_dump> --profile=<profile> poolscanner
Analyzing Kernel Driver IRP Max WMI
`
volatility --profile=Win7SP1x86_23418 -f file.dmp symlinkscanBash
可以从内存中读取bash历史记录。您也可以转储.bash_history文件,但如果它被禁用,您会很高兴能够使用这个volatility模块
./vol.py -f file.dmp linux.bash.BashVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping Registry Hives
voljson -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Advanced Commands
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malfind
Extracting DLLs
volatility -f <memory_dump> --profile=<profile> dlldump -p <pid> -D <output_directory>
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Timelining
volatility -f <memory_dump> --profile=<profile> timeliner
Plugin Resources
Official Volatility Plugins
Volatility Plugin List
Volatility Plugin Development
volatility --profile=Win7SP1x86_23418 -f file.dmp linux_bash时间线
./vol.py -f file.dmp timeLiner.TimeLinerVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
volvality -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> printkey -K <registry_key>
Extracting Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockets
Analyzing Drivers
voljson -f <memory_dump> --profile=<profile>
Analyzing Packed Binaries
volatility -f <memory_dump> --profile=<profile> malfind
Analylining Malicious DLL Injections
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Timelining
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing Process Memory
volatility -f <memory_dump> --profile=<profile> memmap
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyzing Process PEB
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Process Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing Process Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Process Vad
volatility -f <memory_dump> --profile=<profile> vadinfo
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyizing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Process Driverirp
volatility -f <memory_dump> --profile=<profile> driverirp
Analyzing Process Devicetree
volatility -f <memory_dump> --profile=<profile> devicetree
Analyzing Process Drivermodule
volatility -f <memory_dump> --profile=<profile> drivermodule
Analyzing Process Driverobject
volatility -f <memory_dump> --profile=<profile> driverobject
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing Process LDT
volatility -f <memory_dump> --profile=<profile> ldt
Analyzing Process IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing Process SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Process GDI Table
volatility -f <memory_dump> --profile=<profile> gdit
Analyzing Process User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Process Mutants
`volatility -f <memory_dump> --profile=
volatility --profile=Win7SP1x86_23418 -f timeliner驱动程序
./vol.py -f file.dmp windows.driverscan.DriverScanVolatility Cheat Sheet
Basic Commands
Image Identification
volatility -f <memory_dump> imageinfo
Listing Processes
volatility -f <memory_dump> --profile=<profile> pslist
Dumping a Process
volatility -f <memory_dump> --profile=<profile> memdump -p <pid> -D <output_directory>
Listing Network Connections
volatility -f <memory_dump> --profile=<profile> connections
Dumping a File
volvality -f <memory_dump> --profile=<profile> dumpfiles -Q <address_range> -D <output_directory>
Advanced Commands
Detecting Hidden Processes
volatility -f <memory_dump> --profile=<profile> psxview
Analyzing Registry
volatility -f <memory_dump> --profile=<profile> printkey -K <key>
Extracting Registry Hives
volatility -f <memory_dump> --profile=<profile> hivelistvolatility -f <memory_dump> --profile=<profile> printkey -o <offset>
Identifying Sockets
volatility -f <memory_dump> --profile=<profile> sockscan
Analyzing Kernel Modules
voljsonity -f <memory_dump> --profile=<profile> modscan
Analyzing Drivers
volatility -f <memory_dump> --profile=<profile> driverscan
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing Mutants
volatility -f <memory_dump> --profile=<profile> mutantscan
Analyzing Timeliner
volatility -f <memory_dump> --profile=<profile> timeliner
Analyzing PSScan
volatility -f <memory_dump> --profile=<profile> psscan
Analyzing Yara Rules
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing API Hooks
volatility -f <memory_dump> --profile=<profile> apihooks
Analyzing GDT
volatility -f <memory_dump> --profile=<profile> gdt
Analyzing IDT
volatility -f <memory_dump> --profile=<profile> idt
Analyzing SSDT
volatility -f <memory_dump> --profile=<profile> ssdt
Analyzing CSRSS
volatility -f <memory_dump> --profile=<profile> csrss
Analyzing LDR Modules
volatility -f <memory_dump> --profile=<profile> ldrmodules
Analyzing Handles
volatility -f <memory_dump> --profile=<profile> handles
Analyzing Vad Trees
volatility -f <memory_dump> --profile=<profile> vaddump
Analyzing User Handles
volatility -f <memory_dump> --profile=<profile> userhandles
Analyzing Privileges
volatility -f <memory_dump> --profile=<profile> privs
Analyzing DLLs
volatility -f <memory_dump> --profile=<profile> dlllist
Analyizing Threads
volatility -f <memory_dump> --profile=<profile> threads
Analyzing GDI Tables
volatility -f <memory_dump> --profile=<profile> gditimers
Analyzing GDI Objects
volatility -f <memory_dump> --profile=<profile> gdiobjects
Analyzing Atom Tables
volatility -f <memory_dump> --profile=<profile> atomscan
Analyzing Desktops
volatility -f <memory_dump> --profile=<profile> desktops
Analyzing Windows Stations
volatility -f <memory_dump> --profile=<profile> windows
Analyzing Services
volatility -f <memory_dump> --profile=<profile> svcscan
Analyzing Netscan
volatility -f <memory_dump> --profile=<profile> netscan
Analyzing Connections
volatility -f <memory_dump> --profile=<profile> connscan
Analyzing Malfind
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware
volatility -f <memory_dump> --profile=<profile> malprocfind
Analyzing Malware Config
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware Yara
volatility -f <memory_dump> --profile=<profile> yarascan
Analyzing Malware Strings
volatility -f <memory_dump> --profile=<profile> strings
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
volatility -f <memory_dump> --profile=<profile> malfind
Analyzing Malware MZ
`volatility -
volatility --profile=Win7SP1x86_23418 -f file.dmp driverscan获取剪贴板
#Just vol2
volatility --profile=Win7SP1x86_23418 clipboard -f file.dmp获取IE浏览历史
#Just vol2
volatility --profile=Win7SP1x86_23418 iehistory -f file.dmp获取记事本文本
#Just vol2
volatility --profile=Win7SP1x86_23418 notepad -f file.dmp屏幕截图
#Just vol2
volatility --profile=Win7SP1x86_23418 screenshot -f file.dmp主引导记录(MBR)
volatility --profile=Win7SP1x86_23418 mbrparser -f file.dmp主引导记录(MBR) 在管理存储介质的逻辑分区方面发挥着至关重要的作用,这些分区使用不同的文件系统进行结构化。它不仅保存分区布局信息,还包含作为引导加载程序的可执行代码。这个引导加载程序要么直接启动操作系统的第二阶段加载过程(参见第二阶段引导加载程序),要么与每个分区的卷引导记录(VBR)协同工作。欲了解更多信息,请参阅MBR 维基百科页面。
参考资料

RootedCON 是西班牙最重要的网络安全活动之一,也是欧洲最重要的活动之一。作为促进技术知识的使命,这个大会是技术和网络安全专业人士在各个领域的热点交流之地。
最后更新于
