Tools
Astra
Volatility
LDAP Time
Sherlock
ALEAPP (Android Logs, Events, and Protobuf Parser (ALEAPP)
Last updated
Astra
Last updated
#Getting Image info
python3 volatility3/vol.py -f ./Image windows.info.Info
#List process
python3 volatility3/vol.py -f ./Image windows.pslist
#List process tree
python3 volatility3/vol.py -f ./Image windows.pstree
#Get exact command line
python3 volatility3/vol.py -f ./Image windows.cmdline | grep <process_name>
#Get network state
python3 volatility3/vol.py -f ./Image windows.netscan
#Get file present in memory dump
python3 volatility3/vol.py -f ./Image windows.filescan
#memory dump of a particular PID
python3 volatility3/vol.py -f ./Image windows.memmap --pid 3476 --dump
/*sometimes pslist can't show every process,
we can dump amcache to store data aboutstores metadata
about executables that have been run on the system*/
#only presenet in lastest vol3 build
python3 volatility3/vol.py -f ./Image windows.registry.amcache
#we can dump a file from memory if we have its virtual address
#get file virtual address
vol3 -f memory.dmp windows.filescan | grep -i filename
#dump
vol3 -f memory.dmp windows.dumpfiles --virtaddr 0xce05c1bd1db0
vmss2core.exe -W8 Win10x64-456e5d85.vmss Win10x64-456e5d85.vmem#Getting Image info
python2 vol.py -f ./Image imageinfo
#Getting clipboard content
python2 vol.py -f ./Image --profile=Win7SP1x64 clipboard #profile value changes depending upon what image you have, you can get this information from previous command.
#scan file system
python2 vol.py --profile=Win7SP1x64 -f >/Image filescan
#Dumping a file at particular location
python2 vol.py --profile=Win7SP1x64 -f Image dumpfiles -n — dump-dir=lol -Q 0x000...
e.g
originalFileLastModifTimestamp="-1354503710"
originalFileLastModifTimestampHigh="31047188"
2^32*high+actual_low
where
actual_low=(2^32)-originalFileLastModifTimestamp #without sign just the value.