Monday, October 12, 2015

Memory Dump Collection & Analysis

Here is a quick run-down of basic Memory Dump collection and analysis on a Windows 7 machine.

First download a memory dump tool like DumpIt.

Then generate a memory dump by running the tool against the desired machine.
   DumpIt.exe


Move the memory dump to your analysis vm.

Determine what Image type you're going to use.
   python.exe vol.py imageinfo -f WIN7-20151012-174426.raw


Run queries against the dump like "pslist" (process list)
   python.exe vol.py --profile=Win7SP0x86 -f WIN7-20151012-174426.raw pslist


"pstree" (process tree)
   python.exe vol.py --profile=Win7SP0x86 -f WIN7-20151012-174426.raw pstree


"netscan" (connections)
   python.exe vol.py --profile=Win7SP0x86 -f WIN7-20151012-174426.raw netscan


Find all registry hives and query one for a key
   python.exe vol.py --profile=Win7SP0x86 -f WIN7-20151012-174426.raw hivelist
   python.exe vol.py --profile=Win7SP0x86 -f WIN7-20151012-174426.raw printkey -o 0x90839008 -K "Google\Update"


Find all the amazing volatility commands here!

Copyright © 2015, this post cannot be reproduced or retransmitted in any form without reference to the original post.

No comments:

Post a Comment