sleuthkit$hf_mig$

$hf_mig$  时间:2021-04-04  阅读:()

!
!
2.
4!
Edition!
Copyright!
!
2014!
The!
Volatility!
Foundation!
!
!
Development!
build!
and!
wiki:!
github.
com/volatilityfoundation!
!
!
Download!
a!
stable!
release:!
volatilityfoundation.
org!
!
!
Read!
the!
book:!
artofmemoryforensics.
com!
!
Development!
Team!
Blog:!
http://volatilityHlabs.
blogspot.
com!
!
!
(Official)!
Training!
Contact:!
voltraining@memoryanalysis.
net!
!
!
Follow:!
@volatility!
Learn:!
www.
memoryanalysis.
net!
!
!
Basic&Usage&!
Typical!
command!
components:!
!
#!
vol.
py!
Hf!
[image]!
HHprofile=[profile]!
[plugin]!
!
Display!
profiles,!
address!
spaces,!
plugins:!
#!
vol.
py!
HHinfo!
!
Display!
global!
commandHline!
options:!
#!
vol.
py!
HHhelp!
!
Display!
pluginHspecific!
arguments:!
#!
vol.
py!
[plugin]!
HHhelp!
!
Load!
plugins!
from!
an!
external!
directory:!
#!
vol.
py!
HHplugins=[path]!
[plugin]!
!
!
Specify!
a!
DTB!
or!
KDBG!
address:!
#!
vol.
py!
HHdtb=[addr]!
HHkdbg=[addr]!
!
Specify!
an!
output!
file:!
#!
vol.
py!
HHoutputHfile=[file]!
!
Image&Identification&&Get!
profile!
suggestions!
(OS!
and!
architecture):!
imageinfo!
!
&Find!
and!
parse!
the!
debugger!
data!
block:!
kdbgscan!
!
Processes&Listings&!
Basic!
active!
process!
listing:!
pslist!
!
Scan!
for!
hidden!
or!
terminated!
processes:!
psscan!
!
!
Cross!
reference!
processes!
with!
various!
lists:!
psxview!
!
Show!
processes!
in!
parent/child!
tree:!
pstree!
&Process&Information&!
Specify!
–o/HHoffset=OFFSET!
or!
Hp/HHpid=1,2,3!
!
!
Display!
DLLs:!
dlllist!
!
Show!
command!
line!
arguments:!
cmdline!
!
Display!
details!
on!
VAD!
allocations:!
vadinfo!
[HHaddr]!
!
Dump!
allocations!
to!
individual!
files:!
vaddump!
HHdumpHdir=PATH!
[HHbase]!
!
Dump!
all!
valid!
pages!
to!
a!
single!
file:!
memdump!
HHdumpHdir=PATH!
!
Display!
open!
handles:!
handles!
!
!
!
!
!
Ht/HHobjectHtype=TYPE!
!
!
Mutant,!
File,!
Key,!
etc…!
!
!
!
!
Hs/HHsilent!
Hide!
unnamed!
handles!
!
Display!
privileges:!
privs!
!
!
!
!
!
Hr/HHregex=REGEX!
Regex!
privilege!
name!
!
!
!
!
Hs/HHsilent!
Explicitly!
enabled!
only!
!
Display!
SIDs:!
getsids!
!
Display!
environment!
variables:!
envars!
!
PE&File&Extraction&!
Specify!
HD/HHdumpHdir!
to!
any!
of!
these!
plugins!
to!
identify!
your!
desired!
output!
directory.
!
!
!
Dump!
a!
kernel!
module:!
moddump!
!
!
!
!
!
Hr/HHregex=REGEX!
!
!
Regex!
module!
name!
!
!
!
!
!
Hb/HHbase=BASE!
!
!
!
!
!
!
Module!
base!
address!
!
!
Dump!
a!
process:!
procdump!
!
!
!
!
!
Hm/HHmemory!
Include!
memory!
slack!
!
Dump!
DLLs!
in!
process!
memory:!
dlldump!
!
!
!
!
!
Hr/HHregex=REGEX!
!
!
Regex!
module!
name!
!
!
!
!
!
Hb/HHbase=BASE!
!
!
!
!
!
!
Module!
base!
address!
!
&Injected&Code&!
Specify!
–o/HHoffset=OFFSET!
or!
Hp/HHpid=1,2,3!
!
Find!
and!
extract!
injected!
code!
blocks:!
malfind!
!
!
!
!
!
HD/HHdumpHdir=PATH!
!
!
!
Dump!
findings!
here!
!
!
CrossHreference!
DLLs!
with!
memory!
mapped!
files:!
ldrmodules!
!
Scan!
a!
block!
of!
code!
in!
process!
or!
kernel!
memory!
for!
imported!
APIs:!
impscan!
!
!
!
!
!
Hp/HHpid=PID!
Process!
ID!
!
!
!
!
!
Hb/HHbase=BASE!
!
!
Base!
address!
to!
scan!
!
!
!
!
Hs/HHsize=SIZE!
!
!
!
!
!
!
Size!
to!
scan!
from!
start!
of!
base!
!
Logs&/&Histories&!
Recover!
event!
logs!
(XP/2003):!
evtlogs!
!
!
!
!
!
HS/HHsaveHevt!
Save!
raw!
event!
logs!
!
!
!
!
HD/HHdumpHdir=PATH!
!
!
Write!
to!
this!
directory!
!
Recover!
command!
history:!
cmdscan!
and!
consoles!
!
!
Recover!
IE!
cache/Internet!
history:!
iehistory!
!
!
Show!
running!
services:!
svcscan!
!
!
!
!
!
Hv/HHverbose!
!
!
!
Show!
ServiceDll!
from!
registry!
!
Networking&Information&!
Active!
info!
(XP/2003):!
connections!
and!
sockets!
!
!
Scan!
for!
residual!
info!
(XP/2003):!
connscan!
and!
sockscan!
!
Network!
info!
for!
Vista,!
2008,!
and!
7:&netscan!
!
Kernel&Memory&!
Display!
loaded!
kernel!
modules:!
modules!
!
&Scan!
for!
hidden!
or!
residual!
modules:!
modscan!
!
Display!
recently!
unloaded!
modules:&unloadedmodules!
!
Display!
timers!
and!
associated!
DPCs:&timers!
!
!
Display!
kernel!
callbacks,!
notification!
routines:!
callbacks!
!
!
!
Audit!
the!
SSDT!
&ssdt!
!
!
!
!
!
Hv/HHverbose!
!
!
!
Check!
for!
inline!
API!
hooks!
!
Audit!
the!
IDT!
and!
GDT:!
idt!
(x86!
only)!
gdt!
(x86!
only)!
!
Audit!
driver!
dispatch!
(IRP)!
tables:&driverirp!
!
!
!
!
!
Hr/HHregex=REGEX!
!
!
Regex!
driver!
name!
!
Display!
device!
tree!
(find!
stacked!
drivers):!
devicetree!
!
Print!
kernel!
pool!
tag!
usage!
stats:!
pooltracker!
!
!
!
!
!
!
Ht/HHtags=TAGS!
!
!
!
!
!
!
List!
of!
tags!
to!
analyze!
!
!
!
!
!
!
HT/HHtagfile=FILE!
!
!
pooltag.
txt!
for!
labels!
!
!
2.
4!
Edition!
Copyright!
!
2014!
The!
Volatility!
Foundation!
Kernel&Objects&!
Scan!
for!
driver!
objects:!
driverscan!
!
Scan!
for!
mutexes:!
mutantscan!
!
!
!
!
!
Hs/HHsilent!
!
!
!
!
Hide!
unnamed!
mutants!
!
Scan!
for!
used/historical!
file!
objects:!
filescan!
!
Scan!
for!
symbolic!
link!
objects!
(shows!
drive!
mappings):&symlinkscan!
!
Registry&!
Display!
cached!
hives:&hivelist!
!
Print!
a!
key's!
values!
and!
data:&printkey!
!
!
!
!
Ho/HHhive_offset=OFFSET!
!
!
Hive!
address!
(virtual)!
!
!
!
HK/HHkey=KEY!
Key!
path!
!
!
Dump!
userassist!
data:!
userassist!
!
Dump!
shellbags!
information:!
shellbags!
!
Dump!
the!
shimcache:!
shimcache!
!
Timelines&&To!
create!
a!
timeline,!
create!
output!
in!
body!
file!
format.
!
Combine!
the!
data!
and!
run!
sleuthkit's!
mactime!
to!
create!
a!
CSV!
file.
!
!
timeliner!
HHoutput=body!
>!
time.
txt!
shellbags!
HHoutput=body!
>>!
time.
txt!
!
mftparser!
HHoutput=body!
>>!
time.
txt!
!
mactime!
–b!
[time.
txt]!
[Hd]!
>!
csv.
txt!
&Volshell&!
List!
processes:!
>>>!
ps()!
!
Switch!
contexts!
by!
pid,!
offset,!
or!
name:!
>>>!
cc(pid!
=!
3028)!
>>>!
cc(offset!
=!
0x3eb31340,!
physical=True)!
>>>!
cc(name!
=!
"explorer.
exe")!
!
Acquire!
a!
process!
address!
space!
after!
using!
cc:!
>>>!
process_space!
=!
proc().
get_process_address_space()!
!
Disassemble!
data!
in!
an!
address!
space!
>>>!
dis(address,!
length,!
space)!
!
Dump!
bytes,!
dwords!
or!
qwords:!
>>>!
db(address,!
length,!
space)!
>>>!
dd(address,!
length,!
space)!
>>>!
dq(address,!
length,!
space)!
!
!
Display!
a!
type/structure:!
>>>!
dt("_EPROCESS",!
recursive!
=!
True)!
!
Display!
a!
type/structure!
instance:!
>>>!
dt("_EPROCESS",!
!
0x820c92a0)!
!
Create!
an!
object!
in!
kernel!
space:!
>>>!
thread!
=!
obj.
Object("_ETHREAD",!
offset!
=!
!
0x820c92a0,!
vm!
=!
addrspace())&&Dump&Conversion&!
Create!
a!
raw!
memory!
dump!
from!
a!
hibernation,!
crash!
dump,!
firewire!
acquisition,!
virtualbox,!
vmware!
snapshot,!
hpak,!
or!
EWF!
file:!
imagecopy!
–O/HHoutputHimage=FILE!
!
Convert!
any!
of!
the!
aforementioned!
file!
types!
to!
a!
Windows!
crash!
dump!
compatible!
with!
Windbg:!
raw2dmp!
–O/HHoutputHimage=FILE!
&API&Hooks&&!
Scan!
for!
API!
hooks:!
apihooks!
!
!
!
!
!
HR/HHskipHkernel!
!
!
!
!
!
!
!
Don't!
check!
kernel!
modules!
!
!
!
!
HP/HHskipHprocess!
!
!
!
!
!
Don't!
check!
processes!
!
!
!
!
!
HQ/HHquick!
Scan!
faster!
!
!
Yara&Scanning&&!
Scan!
for!
Yara!
signatures:!
yarascan!
!
!
!
!
!
Hp/HHpid=PID!
Process!
IDs!
to!
scan!
!
!
!
!
!
HK/HHkernel!
Scan!
kernel!
memory!
!
!
!
!
HY/HHyaraHrules=RULES!
!
!
String,!
regex,!
bytes,!
etc.
!
!
!
!
!
Hy/HHyaraHfile=FILE!
Yara!
rules!
file!
!
!
!
!
!
HW/HHwide!
Match!
Unicode!
strings!
!
!
!
!
Hs/HHsize!
Size!
of!
preview!
bytes!
!
File&System&Resources&!
Scan!
for!
MFT!
records:!
mftparser!
!
!
!
!
!
HHoutput=body!
!
!
!
Output!
body!
format!
!
!
!
!
HD/HHdumpHdir!
!
!
!
Dump!
MFTHresident!
data!
!
!
Extract!
cached!
files!
(registry!
hives,!
executables):!
dumpfiles!
!
!
!
!
!
HD/HHdumpHdir=PATH!
!
!
!
!
!
!
Output!
directory!
!
!
!
!
!
Hr/HHregex=REGEX!
Regex!
filename!
!
!
Parse!
USN!
journal!
records:!
usnparser!
(github.
com/tomspencer)!
&GUI&Memory&!
Sessions!
(shows!
RDP!
logins):!
!
sessions!
!
Window!
stations!
(shows!
clipboard!
owners):!
wndscan!
!
Desktops!
(find!
ransomware):!
Deskscan!
!
Display!
global!
and!
session!
atom!
tables:!
atoms!
and!
atomscan!
!
!
Dump!
the!
contents!
of!
the!
clipboard:!
clipboard!
!
Detect!
message!
hooks!
(keyloggers):!
messagehooks!
!
Take!
a!
screen!
shot!
from!
the!
memory!
dump:!
screenshot!
HHdumpHdir=PATH!
!
Display!
visible!
and!
hidden!
windows:!
windows!
and!
wintree!
!
Strings&!
Use!
GNU!
strings!
or!
Sysinternals!
strings.
exe:&strings!
Ha!
Htd!
FILE!
>!
strings.
txt!
!
strings!
Ha!
Htd!
Hel!
FILE!
>>!
strings.
txt!
(Unicode)!
!
strings.
exe!
Hq!
Ho!
>!
strings.
txt!
(Windows)!
!
Translate!
the!
string!
addresses:!
strings!
!
!
!
!
Hs/HHstringHfile=FILE!
!
!
!
Input!
strings.
txt!
file!
!
!
!
!
HS/HHscan!
!
!
Password&Recovery&&Dump!
LSA!
secrets:!
lsadump!
!
!
Dump!
cached!
domain!
hashes:!
cachedump!
!
!
Dump!
LM!
and!
NTLM!
hashes:!
hashdump!
(x86!
only)!
!
Extract!
OpenVPN!
credentials:!
openvpn!
(github.
com/Phaeilo)!
!
Extract!
RSA!
private!
keys!
and!
certificates:!
dumpcerts!
!
!
!
!
Hs/HHssl!
!
!
!
!
!
!
Parse!
certificates!
with!
openssl!
!
!
Disk&Encryption&&!
Recover!
cached!
TrueCrypt!
passphrases:!
truecryptpassphrase!
!
!
Triage!
TrueCrypt!
artifacts:!
truecryptsummary!
!
Extract!
TrueCrypt!
master!
keys!
truecryptmaster!
!
Malware&Specific&!
Dump!
Zeus/Citadel!
RC4!
keys:!
zeusscan!
and!
citadelscan!
!
Find!
and!
decode!
Poison!
Ivy!
configs:!
poisonivyconfig!
!
Decode!
Java!
RAT!
config:!
javaratscan!
(github.
com/Rurik)!
!
!
!
2.
4!
Edition!
Copyright!
!
2014!
The!
Volatility!
Foundation!
!
!
General!
Investigations!
Dump!
the!
system's!
raw!
registry!
hive!
files!
dumpfiles!
Dp!
4!
DDregex='(config|ntuser)'!
DDignoreDcase!
DDname!
DD!
.
/!
Create!
a!
Graphviz!
diagram!
of!
processes!
psscan!
DDoutput=dot!
DDoutputDfile=graph.
dot!
Create!
a!
color!
coded!
diagram!
of!
processes!
memory!
vadtree!
Dp!
PID!
DDoutput=dot!
DDoutputDfile=graph.
dot!
Translate!
an!
account!
SID!
to!
user!
name!
printkey!
DK!
"Microsoft\\Windows!
NT\\CurrentVersion\\ProfileList\\[SID]"!
|!
grep!
ProfileImagePath!

青果网络618:洛杉矶CN2 GIA/东京CN2套餐年付199元起,国内高防独服套餐66折

青果网络怎么样?青果网络隶属于泉州市青果网络科技有限公司,青果网络商家成立于2015年4月1日,拥有工信部颁发的全网IDC/ISP/IP-VPN资质,是国内为数不多具有IDC/ISP双资质的综合型云计算服务商。青果网络是APNIC和CNNIC地址分配联盟成员,泉州市互联网协会会员单位,信誉非常有保障。目前,青果网络商家正式开启了618云特惠活动,针对国内外机房都有相应的优惠。点击进入:青果网络官方...

Virtono:€23.7/年,KVM-2GB/25GB/2TB/洛杉矶&达拉斯&纽约&罗马尼亚等

Virtono最近推出了夏季促销活动,为月付、季付、半年付等提供9折优惠码,年付已直接5折,而且下单后在LET回复订单号还能获得双倍内存,不限制付款周期。这是一家成立于2014年的国外VPS主机商,提供VPS和服务器租用等产品,商家支持PayPal、信用卡、支付宝等国内外付款方式,可选数据中心包括罗马尼亚、美国洛杉矶、达拉斯、迈阿密、英国和德国等。下面列出几款VPS主机配置信息,请留意,下列配置中...

云俄罗斯VPSJusthost俄罗斯VPS云服务器justg:JustHost、RuVDS、JustG等俄罗斯vps主机

俄罗斯vps云服务器商家推荐!俄罗斯VPS,也叫毛子主机(毛子vps),因为俄罗斯离中国大陆比较近,所以俄罗斯VPS的延迟会比较低,国内用户也不少,例如新西伯利亚机房和莫斯科机房都是比较热门的俄罗斯机房。这里为大家整理推荐一些好用的俄罗斯VPS云服务器,这里主要推荐这三家:justhost、ruvds、justg等俄罗斯vps主机,方便大家对比购买适合自己的俄罗斯VPS。一、俄罗斯VPS介绍俄罗斯...

$hf_mig$为你推荐
brandoff香港购物在哪里安徽汽车网安徽汽车票查询甲骨文不满赔偿如果合同期不满被单位辞退,用人单位是否需要赔偿bbs.99nets.com做一款即时通讯软件难吗 像hi qq这类的22zizi.comwww 地址 didi22怎么打不开了,还有好看的吗>com原代码什么叫源代码,源代码有什么作用百花百游“百花竟放贺阳春 万物从今尽转新 末数莫言穷运至 不知否极泰来临”是什么意思啊?钟神发战旗TV ID:新年快乐丶未央不见是哪个主播同ip站点同IP做同类站好吗?百度指数词百度指数我创建的新词
网站空间商 域名中介 北京服务器租用 西安服务器租用 vps交流 最便宜虚拟主机 cn域名个人注册 主机评测 42u标准机柜尺寸 服务器日志分析 北京主机 毫秒英文 vip购优汇 cdn加速原理 isp服务商 太原网通测速平台 爱奇艺vip免费领取 多线空间 smtp虚拟服务器 www789 更多