Introduction to Memory Forensics with Volatility 3

Поділитися
Вставка
  • Опубліковано 1 тра 2024
  • Volatility is a very powerful memory forensics tool. It is used to extract information from memory images (memory dumps) of Windows, macOS, and Linux systems. There is also a huge community writing third-party plugins for volatility. You definitely want to include memory acquisition and analysis in your investigations, and volatility should be in your forensic toolkit.
    Today we show how to use Volatility 3 from installation to basic commands. When analyzing memory, basic tasks include listing processes, checking network connections, extracting files, and conducting a basic Windows Registry analysis. We cover each of these tasks. After you understand the Volatility 3 command structure and extract some basic information, advanced memory analysis just builds on those concepts.
    Thank you to our Members and Patrons, but especially to our Investigators, TheRantingGeek, Roman, and Alexis Brignoni! Thank you so much!
    Memory analysis - with the help of volatility 3 - is becoming easier. It is an excellent source of action-related evidence. If you are not already routinely including memory acquisitions in your investigations, I strongly recommend you do. The amount of information available that will never be written to disk is well worth the extra effort.
    00:00 Introduction to Volatility 3
    00:27 Install Volatility 3 on Windows
    04:49 Volatility first run check
    05:49 Find the path of your target memory image
    06:09 Get RAM image info with windows.info
    07:35 Listing installed plugins
    09:07 Get process list from RAM with windows.pslist
    12:09 Filter Volatility output with PowerShell Select-String
    13:55 Find process handles with windows.handles
    16:52 Dump a specific file from RAm with windows.dumpfile
    19:26 Dump all files related to a PID
    20:12 Check executable run options with windows.cmdline
    21:49 Find active network connections with windows.netstat
    23:49 Find local user password hash with windows.hashdump
    24:43 Analyze user actions with windows.registry.userassist
    27:09 Find and dump Registry hives from RAM with windows.registry.hivelist
    28:39 Analyze a specific Registry key from RAM with windows.registry.printkey
    30:18 Intro to Volatility 3 review
    🚀 Full Digital Forensic Courses → learn.dfir.science
    Links:
    * Python: python.org (get version 3)
    * Git for Windows: gitforwindows.org/
    * Microsoft C++ Build Tools: visualstudio.microsoft.com/vi...
    * Python Snappy: www.lfd.uci.edu/~gohlke/pytho...
    * Volatility 3: github.com/volatilityfoundati...
    * Practice memory image: archive.org/details/Africa-DF...
    Volatility Community: www.volatilityfoundation.org/
    Related books:
    * The Art of Memory Forensics (amzn.to/33DTt9b)
    #volatility #forensic #memory #analysis
    010001000100011001010011011000110110100101100101011011100110001101100101
    Get more Digital Forensic Science
    👍 Subscribe → bit.ly/2Ij9Ojc
    ❤️ YT Member → bit.ly/DFIRSciMember
    ❤️ Patreon → / dfirscience
    🕸️ Blog → DFIR.Science
    🤖 Code → github.com/DFIRScience
    🐦 Follow → / dfirscience
    📰 DFIR Newsletter → bit.ly/DFIRNews
    010100110111010101100010011100110110001101110010011010010110001001100101
    Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Please link back to the original video. If you want to use this video for commercial purposes, please contact us first. We would love to see what you are doing.
  • Наука та технологія

КОМЕНТАРІ • 81

  • @silvertechnolo3958
    @silvertechnolo3958 2 роки тому +10

    Just started learning memory forensics with "The Art of Memory Forensics" and wanted a nice little video to supplement my learning. So glad you're here 🤗 thanks a lot

    • @DFIRScience
      @DFIRScience  2 роки тому

      That's a great book! Let me know if you if you have any questions. Thank you!

  • @MrBitviper
    @MrBitviper Рік тому

    awesome tutorial. this is very informative and easy to understand
    thank you so much for this

  • @djnikx1
    @djnikx1 5 місяців тому

    👍Excellent presentation. Thank you!

  • @frooogle99
    @frooogle99 Рік тому

    Thank you! This video has been the best resource so far!! Much appreciate it man! 😊

  • @dead_gawk
    @dead_gawk Місяць тому

    Really enjoyed the class :)

  • @fianvar
    @fianvar Рік тому

    Thanks a lot. Very useful this explaining.

  • @kerryhazelton5977
    @kerryhazelton5977 Рік тому

    Good stuff as usual!

  • @yastazik1982
    @yastazik1982 2 роки тому

    Very informative with great tips thanks 🙏🏻

  • @andreelyusef3235
    @andreelyusef3235 2 місяці тому

    Bro you rock! I am subscribing

  • @genesistorrico343
    @genesistorrico343 Рік тому

    thanks for the video! it was a great help

  • @alfonzo7822
    @alfonzo7822 Рік тому

    I just wrote a massive post then lost it.. my pc then subsequently my network got compromised back in June. Clean install did nothing. Microsoft, HP and bitdefender say that since all virus scans are clear and system has been reinstalled that it's fine.
    It's taken me literally months to get to the point where I have a good idea what is going on but still can't resolve it. Have seen boot files on wireshark from specific ips, my winRE is empty so concluded it must be a pxe boot. Sure enough managed to locate relevant files. However need more info to be able to work out safe removal as so far anything I do hasn't worked. Ran a massive memory dump and tried to use volatility but yeh couldn't get it going properly. However this vid has helped a lot and fingers crossed I'll find the treasure :) thanks a lot for uploading this!

  • @sruthisivaraman2290
    @sruthisivaraman2290 10 місяців тому

    Hi thanks for the video. I would like to know what to do if the translation requirement and symbol table requirement are not fulfilled while listing installed plugins?

  • @zerocool4580
    @zerocool4580 11 місяців тому +1

    Excellent Video and thank you. The only thing I would add is, when I was trying to point Volatility to the .raw memory file I was receiving errors for permissions and so on. I then placed the .raw file in the same folder as the Volatility3 and it finally worked. Just in case others run into this issue.

    • @sruthisivaraman2290
      @sruthisivaraman2290 10 місяців тому

      hey there. I would like to know what to do if the translation requirement and symbol table requirement are not fulfilled while listing installed plugins?

  • @Dxxxxxk
    @Dxxxxxk Рік тому

    Thank you

  • @nemzyxt
    @nemzyxt 9 місяців тому

    Awesome, new sub here, thanks a lot

  • @andrevm9410
    @andrevm9410 2 роки тому

    Great video!

  • @juansanchez6685
    @juansanchez6685 2 роки тому

    Great Video!

  • @carlosdanielbedoyramos4419
    @carlosdanielbedoyramos4419 Рік тому

    hello, will you have a video analyzing the ram memory of a linux with volatility3?

  • @nk8681
    @nk8681 4 місяці тому

    Thanks for this informative but extremely important video for those who need to give a start . There is a request, Can you make a video on Network Artifacts for Linux Memory Forensics, I will be grateful to you, Thanks in advanced.

  • @TheDarkMEXiCaN2020
    @TheDarkMEXiCaN2020 Рік тому

    Can you make a follow up on the issues setting up when you are installing Microsoft tools? Maybe show us what we actually need?

  • @fernandoalvaradomiranda9685

    Hey, how are you, just a question, how do i know my correct version of windows to download snappy?

  • @billbenhaim5332
    @billbenhaim5332 2 роки тому

    Hi, thanks for that video, I really want to replicate that memory dump by myself - On which windows 10x64 OS build have you used? and do you which windows 10 os builds are supported by the volatility version that you have used in the video?

    • @DFIRScience
      @DFIRScience  2 роки тому +1

      It was Windows 10 but the build was from about a year ago. You should get the same results with newer builds of Windows 10 and an updated version of Volatility. Use FTK Imager or Magnet RAM capture on Win10 and you should get what you need. Let me know if you don't get the same results!

    • @sruthisivaraman2290
      @sruthisivaraman2290 10 місяців тому

      Hey there. I would like to know what to do if the translation requirement and symbol table requirement are not fulfilled while listing installed plugins?

  • @shreyaskumar3091
    @shreyaskumar3091 2 місяці тому

    Hey there! Amazing video, but I got stuck at the part of the ACTF.mem file. I could not figure out from where to get that file.
    Kindly help.

  • @rashmig2110
    @rashmig2110 Рік тому

    I am unable to get windows.cachedump.Cachedump option in my volatility latest version.pls help

  • @0galeicrum
    @0galeicrum Рік тому +1

    Hi, I have a question, 28:25 I have my .hive file, but it's a bit confusing using the hex reader, I'm using kali, is there an alternative to analyse this file?

    • @sruthisivaraman2290
      @sruthisivaraman2290 10 місяців тому

      hey there. I would like to know what to do if the translation requirement and symbol table requirement are not fulfilled while listing installed plugins?

  • @liveyourlifeplease
    @liveyourlifeplease Рік тому

    Has anyone came across with the idea of creating aliases for volatility plugins, so we make the command line cleaner? --btw great video, thank you

  • @adamgrumpy87
    @adamgrumpy87 2 роки тому

    Do you have to install all the C++ build tools or only the core ones?

    • @DFIRScience
      @DFIRScience  2 роки тому

      I believe core only would work.

  • @DaFunkyFRO
    @DaFunkyFRO Рік тому

    Great video. Unfortunately hashdump and netstat don't seem to appear in the 2.4.0 framework (the latest pulled as of this posting)

    • @vtrhbr
      @vtrhbr Рік тому

      hey how did you end up using hashmap?

    • @bartkor1220
      @bartkor1220 Рік тому

      yeah I tried using windows.netstat but it just errored

    • @vtrhbr
      @vtrhbr Рік тому

      @@bartkor1220 Yes, stop using this piece of software :D

  • @user-ne8hc3xf3d
    @user-ne8hc3xf3d Рік тому +1

    volatility 2.6 didn't work for WIn10 memory, but now i gonna use volatility 3. Really helpful video! Thanks. And could I write those processes in my blog with citation? If you say "NO", I'll just memorize in my head.

    • @DFIRScience
      @DFIRScience  Рік тому

      Take a look at dfir.science/2022/02/Introduction-to-Memory-Forensics-with-Volatility-3
      The commands are listed under the video. But, yeah, if you want to put it in your blog, it's all good.

    • @sruthisivaraman2290
      @sruthisivaraman2290 10 місяців тому

      I would like to know what to do if the translation requirement and symbol table requirement are not fulfilled while listing installed plugins?

  • @userewjonqk
    @userewjonqk 6 місяців тому

    How should we know if there is malware in the field or in memory

  • @Renglus
    @Renglus 4 місяці тому

    For some reason, when doing the windows.handles nothing shows up at all, and when trying to dump a file, it just does a PDB scanning. I cannot find any answers to this problem on the internet

  • @stuna2754
    @stuna2754 Рік тому

    I don't see snappy v0.6.0 available at that link which is the required version for volatility3. is there another way to install snappy on windows?

    • @DFIRScience
      @DFIRScience  Рік тому

      It's about 75% of the way down. They have v0.6.1. Here is the link for Win AMD64: download.lfd.uci.edu/pythonlibs/archived/python_snappy-0.6.1-cp311-cp311-win_amd64.whl

    • @stuna2754
      @stuna2754 Рік тому

      @@DFIRScience The requirementss.txt for Volatility3 says v0.6.0 so I'm not able to get it work with v0.6.1

  • @smithj7U
    @smithj7U Рік тому +1

    I can't get the installation stuff to work. I know how to open the windows powershell in the try hack me attack room. So frustrating. video after video and I can't get volatility to be installed. 😞

    • @CyDig
      @CyDig 11 місяців тому +1

      I installed Volatility 3 in Windows 11, and it works great.

  • @hammazahmed1289
    @hammazahmed1289 2 місяці тому

    I was having problem with checking the python version. It was so trivial. It didn't work coz in windows I must also install python using Microsoft store.

  • @segunoludare8713
    @segunoludare8713 2 роки тому

    It appears python-snappy isn't allowing the installation of "requirements.txt". Any help?

    • @DFIRScience
      @DFIRScience  2 роки тому +1

      You may need to download python-snappy and install it separately. I had the same trouble on Windows.
      pypi.org/project/python-snappy/

  • @user-jh6yv1wh9w
    @user-jh6yv1wh9w Рік тому

    I download "python_snappy-0.6.1-cp310-cp310-win_amd64.whl" and install using pip install.
    Power shell told me
    "python-snappy is already installed with the same version as the provided wheel. Use --force-reinstall to force an installation of the wheel."
    And I try "pip install -r .
    equirements.txt" but I got "ERROR: Failed building wheel for python-snappy".
    How to solve this problem??

    • @DFIRScience
      @DFIRScience  Рік тому

      Try pip uninstall python-snappy then reinstall from the downloaded whl. You should not need to compile.

    • @user-jh6yv1wh9w
      @user-jh6yv1wh9w Рік тому

      @@DFIRScience I try
      "pip uninstall python-snappy" and get
      "Successfully uninstalled python-snappy-0.6.1"
      now I try again
      "pip install python_snappy-0.6.1-cp310-cp310-win_amd64.whl" and get
      "Successfully installed python-snappy-0.6.1"
      And try
      "pip install -r .
      equirements.txt" and get
      "ERROR: Failed building wheel for python-snappy".
      PowerShell told me "fatal error LNK1181: 'snappy.lib' can't open "
      Please help me . . . :(

    • @DFIRScience
      @DFIRScience  Рік тому

      @@user-jh6yv1wh9w Do you happen to have two versions of python installed? That could be the conflict. Try removing all version of python and installing the newest version (3.10.7) from www.python.org/

  • @aarishfakih741
    @aarishfakih741 Рік тому +1

    I am not able to install python snappy... it says wheel is not supported... What should I do now?

    • @CyDig
      @CyDig 11 місяців тому +1

      It is very simple to install and config

    • @galloe
      @galloe 2 місяці тому

      @@CyDig So explain it to them, don't be a dick.

  • @vivekpadman5248
    @vivekpadman5248 Рік тому +1

    Can somebody provide a link for example dump files

    • @CyDig
      @CyDig 11 місяців тому +1

      You can create it by using FTK Imager or Magnet RAM Capture

  • @eliassaloum48
    @eliassaloum48 Рік тому +1

    how do i get the memory dump?

    • @CyDig
      @CyDig 11 місяців тому +1

      You can use FTK Imager or Magnet RAM Capture

  • @liszadarling
    @liszadarling Рік тому

    I'm stuck at snappy. tried every single one for my laptop and none of them are supported. I've double-checked the build tools being installed correctly and it is. Power Shell is now saying volatility error: please select a plugin to run. How do I resolve this? I need to get volatility up and running for a project. Thanks!

    • @midlifehemi88
      @midlifehemi88 3 місяці тому

      Did you ever figure this out? I'm trying to install Python Snappy as well and getting the same issue. Just says it isn't a supported .whl on this platform

  • @defnd3r
    @defnd3r 2 роки тому +1

    It's okay to hit like before starting the video correct? Because that's what I do before I watch any of your videos.

    • @DFIRScience
      @DFIRScience  2 роки тому

      Thank you so much! 😆

    • @PiperUsmc
      @PiperUsmc 2 роки тому

      lol just did the same thing

  • @microlab3692
    @microlab3692 2 роки тому

  • @SoulJah876
    @SoulJah876 2 роки тому

    I don't seem to have hashdump - to the Googles.

    • @SoulJah876
      @SoulJah876 2 роки тому

      One can always count on the Googles :D

    • @DFIRScience
      @DFIRScience  2 роки тому

      Did you get the newest version of Volatility 3? (2.0.0+)? Did you find hashdump?

    • @SoulJah876
      @SoulJah876 2 роки тому

      @@DFIRScience yeah I had to pip the full requirements and then reinstall. I had only done minimal before.

  • @jasonmoore4429
    @jasonmoore4429 2 роки тому +3

    the easiest way to get python 3 to work with powershell goto the MS Store

    • @DFIRScience
      @DFIRScience  2 роки тому +2

      I don't know why I didn't even consider MS Store. Thanks for that!

  • @EvilSapphireR
    @EvilSapphireR 3 місяці тому

    Is this eli the computer guy?

  • @breves
    @breves 2 місяці тому

    Hi there and thanks for posting! How did you dump the ntuser.dat (25:21) ? cant seem to find an option for that and windows.dumpfiles does not take the hive offset...EDIT: I used windows.filescan, thanks anyway