Home > forensics > Memory Forensics
Memory Forensics
Posted on 9 November 2011 by c0decstuff
Pull Process & Network Connections from a Memory Dump
In the previous article, we learned how to pull passwords from a memory dump file. This time, we will cover viewing a process list and network connections out of captured memory files.
Volatility’s “pslist” command can be used to view the processes that were running on a Windows system:
volatility pslist -f memdumpfilename.raw –profile=Win7SP1x86 (Use double dashes in front of profile for some reason they are showing up as a single)
From the output of the command, we see the physical memory location, process name and the PID number of all process that were running on the system. This helps deduce if something was running on the computer that should not have been and as you will see in a future article, allows you to view programs that may be running under the process.
The next step is to view all network connections that were active from the memory dump:
volatility netscan -f memdumpfilename.raw –profile=Win7SP1x86 (Use double dashes in front of profile)
The data returned shows all network connections, including the process name, source and destination IP addresses – including ports. This is just a short snip of what was actually returned, the actual list is easily twice as long. This information helps the analyst see if there were any strange network connections active. Or can help the penetration tester gain valuable information about the network.
The last command that we will look at this time is “bioskbd“.
volatility bioskbd -f memdumpfilename.raw –profile=Win7SP1x86 (Use double dashes in front of profile)
As you can see there is no data returned on this memory dump. But what does “bioskbd” actually do? This interesting command has the ability to pull passwords that are resident from the bios cache buffer. Though most newer systems (like the system that this memory dump was taken from) purge the bios keyboard buffer, many older ones did not. On an old system you might be able to retrieve BIOS boot passwords, or even the passwords for disk encryption systems.
That’s it for this post, on the next Memory Forensics post, we will take a look at pulling malware samples off of an infected system!
Category Article forensics
Total Pageviews
Labels
- Android (1)
- Aplication (14)
- ARP (1)
- Backdoored (2)
- Browser (1)
- Cloud (1)
- Exploitation (1)
- Exploits (7)
- Facebook (2)
- forensics (3)
- Hacking (11)
- Hijacking (1)
- Honeypot (1)
- HTML5 (1)
- ios (2)
- Jailbreak (2)
- Linux (1)
- Malware (5)
- metasploit (2)
- Meterpreter (1)
- Movie (1)
- Networking (1)
- News (2)
- password attack (2)
- Penetration Test (2)
- Python (1)
- reverse engineering (1)
- Rootkits (1)
- Security (12)
- shellcode (2)
- Stuxnet/Duqu (2)
- Uncategories (1)
- Virus (1)
- Vulnerability (8)
- Web (5)
- Wifi (1)
- Windows (5)
Blog Archive
-
▼
11
(51)
-
▼
Nov
(12)
- How to Fix iOS 5 Errors
- Jailbreak iOS 5.0/iOS 5.0.1 Using Ac1dSn0w
- Anatomy of Self Inflicted Javascript Injection "fa...
- Understanding Private Clouds
- HTML5, Local Storage, and XSS
- Honey Potting for MS11-083
- Duqu Installer Contained Microsoft Word Zero-Day E...
- The History of Computer Viruses
- Memory Forensics
- Hijacking Google Analytics
- RemoteExec Computers List Buffer Overflow ROP Exploit
- Jailbreak iOS 5.0.1 On Windows Using Sn0wbreeze 2....
-
▼
Nov
(12)
Friendlist
Security Resources
-
-
-
This feed contains no entries
-
-
-
-
-
-
-
-
-