Examples of Volatility2 - XuehengWang/LiME-Volatility GitHub Wiki
Volatility2的部分功能
-
In this part, we will introduce some Linux plugins of volatility to analyze the memory file we extracted (either from our local machine or some external machines)
-
Before this part, we need to make sure the profile we built matches the target system in Linux distribution, exact kernel version, and CPU architecture (32-bit, 64-bit, etc)
-
NOTE:在使用volatility的任何插件时,python命令行都需要带上
--profile=
例如下图,我查看生成的Profile,确认了与我获取内存的内核版本一致后;在使用任何插件时,都应在命令行包含
--profile=LinuxUbuntu_4_15_0-112-generic_profilex64
查看Linux支持的Plugins
$ python2 vol.py --info | grep linux
linux_psaux: 查看系统运行的程序
$ python2 vol.py -f ../LiME/dump.mem linux_psaux --profile=<Profile name>
linux_netstat: 查看网络连接状态
$ python2 vol.py -f ../LiME/dump.mem linux_netstat --profile=<Profile name>
linux_mount: which file system were mounted
$ python2 vol.py -f ../LiME/dump.mem linux_mount --profile=<Profile name>
linux_lsmod: what kernel modules were loaded
$ python2 vol.py -f ../LiME/dump.mem linux_lsmod --profile=<Profile name>
linux_bash: 查看Bash command history
$ python2 vol.py -f ../LiME/dump.mem linux_bash --profile=<Profile name>
linux_mount: what files were opened by which processes
$ python2 vol.py -f ../LiME/dump.mem linux_lsof --profile=<Profile name>
Check the Linux plugins scripts
$ ls volatility/plugins/linux/
Open a shell within the memory dump
$ python2 vol.py -f ../LiME/dump.mem linux_volshell --profile=<Profile name> -v