sleuthkit$hf_mig$

$hf_mig$  时间:2021-04-04  阅读:()

!
!
2.
4!
Edition!
Copyright!
!
2014!
The!
Volatility!
Foundation!
!
!
Development!
build!
and!
wiki:!
github.
com/volatilityfoundation!
!
!
Download!
a!
stable!
release:!
volatilityfoundation.
org!
!
!
Read!
the!
book:!
artofmemoryforensics.
com!
!
Development!
Team!
Blog:!
http://volatilityHlabs.
blogspot.
com!
!
!
(Official)!
Training!
Contact:!
voltraining@memoryanalysis.
net!
!
!
Follow:!
@volatility!
Learn:!
www.
memoryanalysis.
net!
!
!
Basic&Usage&!
Typical!
command!
components:!
!
#!
vol.
py!
Hf!
[image]!
HHprofile=[profile]!
[plugin]!
!
Display!
profiles,!
address!
spaces,!
plugins:!
#!
vol.
py!
HHinfo!
!
Display!
global!
commandHline!
options:!
#!
vol.
py!
HHhelp!
!
Display!
pluginHspecific!
arguments:!
#!
vol.
py!
[plugin]!
HHhelp!
!
Load!
plugins!
from!
an!
external!
directory:!
#!
vol.
py!
HHplugins=[path]!
[plugin]!
!
!
Specify!
a!
DTB!
or!
KDBG!
address:!
#!
vol.
py!
HHdtb=[addr]!
HHkdbg=[addr]!
!
Specify!
an!
output!
file:!
#!
vol.
py!
HHoutputHfile=[file]!
!
Image&Identification&&Get!
profile!
suggestions!
(OS!
and!
architecture):!
imageinfo!
!
&Find!
and!
parse!
the!
debugger!
data!
block:!
kdbgscan!
!
Processes&Listings&!
Basic!
active!
process!
listing:!
pslist!
!
Scan!
for!
hidden!
or!
terminated!
processes:!
psscan!
!
!
Cross!
reference!
processes!
with!
various!
lists:!
psxview!
!
Show!
processes!
in!
parent/child!
tree:!
pstree!
&Process&Information&!
Specify!
–o/HHoffset=OFFSET!
or!
Hp/HHpid=1,2,3!
!
!
Display!
DLLs:!
dlllist!
!
Show!
command!
line!
arguments:!
cmdline!
!
Display!
details!
on!
VAD!
allocations:!
vadinfo!
[HHaddr]!
!
Dump!
allocations!
to!
individual!
files:!
vaddump!
HHdumpHdir=PATH!
[HHbase]!
!
Dump!
all!
valid!
pages!
to!
a!
single!
file:!
memdump!
HHdumpHdir=PATH!
!
Display!
open!
handles:!
handles!
!
!
!
!
!
Ht/HHobjectHtype=TYPE!
!
!
Mutant,!
File,!
Key,!
etc…!
!
!
!
!
Hs/HHsilent!
Hide!
unnamed!
handles!
!
Display!
privileges:!
privs!
!
!
!
!
!
Hr/HHregex=REGEX!
Regex!
privilege!
name!
!
!
!
!
Hs/HHsilent!
Explicitly!
enabled!
only!
!
Display!
SIDs:!
getsids!
!
Display!
environment!
variables:!
envars!
!
PE&File&Extraction&!
Specify!
HD/HHdumpHdir!
to!
any!
of!
these!
plugins!
to!
identify!
your!
desired!
output!
directory.
!
!
!
Dump!
a!
kernel!
module:!
moddump!
!
!
!
!
!
Hr/HHregex=REGEX!
!
!
Regex!
module!
name!
!
!
!
!
!
Hb/HHbase=BASE!
!
!
!
!
!
!
Module!
base!
address!
!
!
Dump!
a!
process:!
procdump!
!
!
!
!
!
Hm/HHmemory!
Include!
memory!
slack!
!
Dump!
DLLs!
in!
process!
memory:!
dlldump!
!
!
!
!
!
Hr/HHregex=REGEX!
!
!
Regex!
module!
name!
!
!
!
!
!
Hb/HHbase=BASE!
!
!
!
!
!
!
Module!
base!
address!
!
&Injected&Code&!
Specify!
–o/HHoffset=OFFSET!
or!
Hp/HHpid=1,2,3!
!
Find!
and!
extract!
injected!
code!
blocks:!
malfind!
!
!
!
!
!
HD/HHdumpHdir=PATH!
!
!
!
Dump!
findings!
here!
!
!
CrossHreference!
DLLs!
with!
memory!
mapped!
files:!
ldrmodules!
!
Scan!
a!
block!
of!
code!
in!
process!
or!
kernel!
memory!
for!
imported!
APIs:!
impscan!
!
!
!
!
!
Hp/HHpid=PID!
Process!
ID!
!
!
!
!
!
Hb/HHbase=BASE!
!
!
Base!
address!
to!
scan!
!
!
!
!
Hs/HHsize=SIZE!
!
!
!
!
!
!
Size!
to!
scan!
from!
start!
of!
base!
!
Logs&/&Histories&!
Recover!
event!
logs!
(XP/2003):!
evtlogs!
!
!
!
!
!
HS/HHsaveHevt!
Save!
raw!
event!
logs!
!
!
!
!
HD/HHdumpHdir=PATH!
!
!
Write!
to!
this!
directory!
!
Recover!
command!
history:!
cmdscan!
and!
consoles!
!
!
Recover!
IE!
cache/Internet!
history:!
iehistory!
!
!
Show!
running!
services:!
svcscan!
!
!
!
!
!
Hv/HHverbose!
!
!
!
Show!
ServiceDll!
from!
registry!
!
Networking&Information&!
Active!
info!
(XP/2003):!
connections!
and!
sockets!
!
!
Scan!
for!
residual!
info!
(XP/2003):!
connscan!
and!
sockscan!
!
Network!
info!
for!
Vista,!
2008,!
and!
7:&netscan!
!
Kernel&Memory&!
Display!
loaded!
kernel!
modules:!
modules!
!
&Scan!
for!
hidden!
or!
residual!
modules:!
modscan!
!
Display!
recently!
unloaded!
modules:&unloadedmodules!
!
Display!
timers!
and!
associated!
DPCs:&timers!
!
!
Display!
kernel!
callbacks,!
notification!
routines:!
callbacks!
!
!
!
Audit!
the!
SSDT!
&ssdt!
!
!
!
!
!
Hv/HHverbose!
!
!
!
Check!
for!
inline!
API!
hooks!
!
Audit!
the!
IDT!
and!
GDT:!
idt!
(x86!
only)!
gdt!
(x86!
only)!
!
Audit!
driver!
dispatch!
(IRP)!
tables:&driverirp!
!
!
!
!
!
Hr/HHregex=REGEX!
!
!
Regex!
driver!
name!
!
Display!
device!
tree!
(find!
stacked!
drivers):!
devicetree!
!
Print!
kernel!
pool!
tag!
usage!
stats:!
pooltracker!
!
!
!
!
!
!
Ht/HHtags=TAGS!
!
!
!
!
!
!
List!
of!
tags!
to!
analyze!
!
!
!
!
!
!
HT/HHtagfile=FILE!
!
!
pooltag.
txt!
for!
labels!
!
!
2.
4!
Edition!
Copyright!
!
2014!
The!
Volatility!
Foundation!
Kernel&Objects&!
Scan!
for!
driver!
objects:!
driverscan!
!
Scan!
for!
mutexes:!
mutantscan!
!
!
!
!
!
Hs/HHsilent!
!
!
!
!
Hide!
unnamed!
mutants!
!
Scan!
for!
used/historical!
file!
objects:!
filescan!
!
Scan!
for!
symbolic!
link!
objects!
(shows!
drive!
mappings):&symlinkscan!
!
Registry&!
Display!
cached!
hives:&hivelist!
!
Print!
a!
key's!
values!
and!
data:&printkey!
!
!
!
!
Ho/HHhive_offset=OFFSET!
!
!
Hive!
address!
(virtual)!
!
!
!
HK/HHkey=KEY!
Key!
path!
!
!
Dump!
userassist!
data:!
userassist!
!
Dump!
shellbags!
information:!
shellbags!
!
Dump!
the!
shimcache:!
shimcache!
!
Timelines&&To!
create!
a!
timeline,!
create!
output!
in!
body!
file!
format.
!
Combine!
the!
data!
and!
run!
sleuthkit's!
mactime!
to!
create!
a!
CSV!
file.
!
!
timeliner!
HHoutput=body!
>!
time.
txt!
shellbags!
HHoutput=body!
>>!
time.
txt!
!
mftparser!
HHoutput=body!
>>!
time.
txt!
!
mactime!
–b!
[time.
txt]!
[Hd]!
>!
csv.
txt!
&Volshell&!
List!
processes:!
>>>!
ps()!
!
Switch!
contexts!
by!
pid,!
offset,!
or!
name:!
>>>!
cc(pid!
=!
3028)!
>>>!
cc(offset!
=!
0x3eb31340,!
physical=True)!
>>>!
cc(name!
=!
"explorer.
exe")!
!
Acquire!
a!
process!
address!
space!
after!
using!
cc:!
>>>!
process_space!
=!
proc().
get_process_address_space()!
!
Disassemble!
data!
in!
an!
address!
space!
>>>!
dis(address,!
length,!
space)!
!
Dump!
bytes,!
dwords!
or!
qwords:!
>>>!
db(address,!
length,!
space)!
>>>!
dd(address,!
length,!
space)!
>>>!
dq(address,!
length,!
space)!
!
!
Display!
a!
type/structure:!
>>>!
dt("_EPROCESS",!
recursive!
=!
True)!
!
Display!
a!
type/structure!
instance:!
>>>!
dt("_EPROCESS",!
!
0x820c92a0)!
!
Create!
an!
object!
in!
kernel!
space:!
>>>!
thread!
=!
obj.
Object("_ETHREAD",!
offset!
=!
!
0x820c92a0,!
vm!
=!
addrspace())&&Dump&Conversion&!
Create!
a!
raw!
memory!
dump!
from!
a!
hibernation,!
crash!
dump,!
firewire!
acquisition,!
virtualbox,!
vmware!
snapshot,!
hpak,!
or!
EWF!
file:!
imagecopy!
–O/HHoutputHimage=FILE!
!
Convert!
any!
of!
the!
aforementioned!
file!
types!
to!
a!
Windows!
crash!
dump!
compatible!
with!
Windbg:!
raw2dmp!
–O/HHoutputHimage=FILE!
&API&Hooks&&!
Scan!
for!
API!
hooks:!
apihooks!
!
!
!
!
!
HR/HHskipHkernel!
!
!
!
!
!
!
!
Don't!
check!
kernel!
modules!
!
!
!
!
HP/HHskipHprocess!
!
!
!
!
!
Don't!
check!
processes!
!
!
!
!
!
HQ/HHquick!
Scan!
faster!
!
!
Yara&Scanning&&!
Scan!
for!
Yara!
signatures:!
yarascan!
!
!
!
!
!
Hp/HHpid=PID!
Process!
IDs!
to!
scan!
!
!
!
!
!
HK/HHkernel!
Scan!
kernel!
memory!
!
!
!
!
HY/HHyaraHrules=RULES!
!
!
String,!
regex,!
bytes,!
etc.
!
!
!
!
!
Hy/HHyaraHfile=FILE!
Yara!
rules!
file!
!
!
!
!
!
HW/HHwide!
Match!
Unicode!
strings!
!
!
!
!
Hs/HHsize!
Size!
of!
preview!
bytes!
!
File&System&Resources&!
Scan!
for!
MFT!
records:!
mftparser!
!
!
!
!
!
HHoutput=body!
!
!
!
Output!
body!
format!
!
!
!
!
HD/HHdumpHdir!
!
!
!
Dump!
MFTHresident!
data!
!
!
Extract!
cached!
files!
(registry!
hives,!
executables):!
dumpfiles!
!
!
!
!
!
HD/HHdumpHdir=PATH!
!
!
!
!
!
!
Output!
directory!
!
!
!
!
!
Hr/HHregex=REGEX!
Regex!
filename!
!
!
Parse!
USN!
journal!
records:!
usnparser!
(github.
com/tomspencer)!
&GUI&Memory&!
Sessions!
(shows!
RDP!
logins):!
!
sessions!
!
Window!
stations!
(shows!
clipboard!
owners):!
wndscan!
!
Desktops!
(find!
ransomware):!
Deskscan!
!
Display!
global!
and!
session!
atom!
tables:!
atoms!
and!
atomscan!
!
!
Dump!
the!
contents!
of!
the!
clipboard:!
clipboard!
!
Detect!
message!
hooks!
(keyloggers):!
messagehooks!
!
Take!
a!
screen!
shot!
from!
the!
memory!
dump:!
screenshot!
HHdumpHdir=PATH!
!
Display!
visible!
and!
hidden!
windows:!
windows!
and!
wintree!
!
Strings&!
Use!
GNU!
strings!
or!
Sysinternals!
strings.
exe:&strings!
Ha!
Htd!
FILE!
>!
strings.
txt!
!
strings!
Ha!
Htd!
Hel!
FILE!
>>!
strings.
txt!
(Unicode)!
!
strings.
exe!
Hq!
Ho!
>!
strings.
txt!
(Windows)!
!
Translate!
the!
string!
addresses:!
strings!
!
!
!
!
Hs/HHstringHfile=FILE!
!
!
!
Input!
strings.
txt!
file!
!
!
!
!
HS/HHscan!
!
!
Password&Recovery&&Dump!
LSA!
secrets:!
lsadump!
!
!
Dump!
cached!
domain!
hashes:!
cachedump!
!
!
Dump!
LM!
and!
NTLM!
hashes:!
hashdump!
(x86!
only)!
!
Extract!
OpenVPN!
credentials:!
openvpn!
(github.
com/Phaeilo)!
!
Extract!
RSA!
private!
keys!
and!
certificates:!
dumpcerts!
!
!
!
!
Hs/HHssl!
!
!
!
!
!
!
Parse!
certificates!
with!
openssl!
!
!
Disk&Encryption&&!
Recover!
cached!
TrueCrypt!
passphrases:!
truecryptpassphrase!
!
!
Triage!
TrueCrypt!
artifacts:!
truecryptsummary!
!
Extract!
TrueCrypt!
master!
keys!
truecryptmaster!
!
Malware&Specific&!
Dump!
Zeus/Citadel!
RC4!
keys:!
zeusscan!
and!
citadelscan!
!
Find!
and!
decode!
Poison!
Ivy!
configs:!
poisonivyconfig!
!
Decode!
Java!
RAT!
config:!
javaratscan!
(github.
com/Rurik)!
!
!
!
2.
4!
Edition!
Copyright!
!
2014!
The!
Volatility!
Foundation!
!
!
General!
Investigations!
Dump!
the!
system's!
raw!
registry!
hive!
files!
dumpfiles!
Dp!
4!
DDregex='(config|ntuser)'!
DDignoreDcase!
DDname!
DD!
.
/!
Create!
a!
Graphviz!
diagram!
of!
processes!
psscan!
DDoutput=dot!
DDoutputDfile=graph.
dot!
Create!
a!
color!
coded!
diagram!
of!
processes!
memory!
vadtree!
Dp!
PID!
DDoutput=dot!
DDoutputDfile=graph.
dot!
Translate!
an!
account!
SID!
to!
user!
name!
printkey!
DK!
"Microsoft\\Windows!
NT\\CurrentVersion\\ProfileList\\[SID]"!
|!
grep!
ProfileImagePath!

百星数据(60元/月,600元/年)日本/韩国/香港cn2 gia云服务器,2核2G/40G/5M带宽

百星数据(baixidc),2012年开始运作至今,主要提供境外自营云服务器和独立服务器出租业务,根据网络线路的不同划分为:美国cera 9929、美国cn2 gia、香港cn2 gia、韩国cn2 gia、日本cn2 gia等云服务器及物理服务器业务。目前,百星数据 推出的日本、韩国、香港cn2 gia云服务器,2核2G/40G/5M带宽低至60元/月,600元/年。百星数据优惠码:优惠码:30...

Krypt($120/年),2vCPU/2GB/60GB SSD/3TB

Krypt这两天发布了ION平台9月份优惠信息,提供一款特选套餐年付120美元(原价$162/年),开设在洛杉矶或者圣何塞机房,支持Windows或者Linux操作系统。ion.kryptcloud.com是Krypt机房上线的云主机平台,主要提供基于KVM架构云主机产品,相对于KT主站云服务器要便宜很多,产品可选洛杉矶、圣何塞或者新加坡等地机房。洛杉矶机房CPU:2 cores内存:2GB硬盘:...

腾讯云轻量服务器老用户续费优惠和老用户复购活动

继阿里云服务商推出轻量服务器后,腾讯云这两年对于轻量服务器的推广力度还是比较大的。实际上对于我们大部分网友用户来说,轻量服务器对于我们网站和一般的业务来说是绝对够用的。反而有些时候轻量服务器的带宽比CVM云服务器够大,配置也够好,更有是价格也便宜,所以对于初期的网站业务来说轻量服务器是够用的。这几天UCLOUD优刻得香港服务器稳定性不佳,于是有网友也在考虑搬迁到腾讯云服务器商家,对于轻量服务器官方...

$hf_mig$为你推荐
.cn域名cn是什么域名?摩根币JPM摩根币是什么?怎么赚钱是骗人的吗?www.20ren.com求此欧美艳星名字http://www.sqsmm.com/index.php?album-read-id-1286.html罗伦佐娜维洛娜毛周角化修复液治疗毛周角化有用吗?谁用过?能告诉我吗?钟神发跪求钟神发名言出处,A站大神看过来同一ip网站如何用不同的IP同时登陆一个网站百度关键词分析百度竞价关键词分析需要从哪些数据入手?www.kanav001.com跪求下载[GJOS-024] 由愛可奈 [Kana Yume] 現役女子高生グラビア种子的网址谁有www.1diaocha.com手机网赚是真的吗本冈一郎本冈一郎有副作用吗?主要有什么呢?
短域名 vps代购 新通用顶级域名 80vps 名片模板psd 长沙服务器 台湾谷歌网址 促正网秒杀 京东商城0元抢购 怎么测试下载速度 卡巴斯基试用版 傲盾官网 gtt 域名dns 带宽租赁 监控服务器 学生服务器 网页加速 网站加速 万网服务器 更多