Memory Forensics (Volatility 3)
OS Information
./vol.py -f file.dmp windows.info.InfoHashes/Passwords
./vol.py -f file.dmp windows.hashdump.Hashdump #Grab common windows hashes (SAM+SYSTEM)
./vol.py -f file.dmp windows.cachedump.Cachedump #Grab domain cache hashes inside the registry
./vol.py -f file.dmp windows.lsadump.Lsadump #Grab lsa secretsProcesses
python3 vol.py -f file.dmp windows.pstree.PsTree # Get processes tree (not hidden)
python3 vol.py -f file.dmp windows.pslist.PsList # Get process list (EPROCESS)
python3 vol.py -f file.dmp windows.psscan.PsScan # Get hidden process list(malware)./vol.py -f file.dmp windows.dumpfiles.DumpFiles --pid <pid> #Dump the .exe and dlls of the process in the current directoryCommand line
Services
Strings Per Processes
Environment
Token privileges
SIDs
Handles
DLLs
UserAssist
Network
Registry hive
Get a value
Filesystem
Malware
Scanning with Yara
Mutexes
Symlinks
TimeLine
Drivers
Last updated