Volatility2 Basics (Linux)
Last updated
Last updated
A memory dump is provided in the home directory of the root user. You have to use Volatility to answer the following questions:
Which command is used to list all profiles supported by Volatility?
What is the name of the profile which is present for Ubuntu Linux?
Which command can be used to extract the CPU details from the memory dump?
Which command can be used to retrieve the list running processes from memory dump?
Which command can be used to show the processes in the parent-child relationship format?
Which command can be used to extract the list of open TCP connections from the memory dump?
What was the IP address of the machine on which the memory dump was taken?
Which command can identify the applications (which are using a promiscuous socket) from the memory dump?
Which command can be used to recover the bash command history from the memory dump?
To list all profiles I can use the command:
vol.py --info
The profile name for linux ubuntu is:
LinuxUbuntu-16_04-4_15_0_45-genericx64
To identify the cpu I'll use the following command:
vol.py -f memory_dump.img linux_cpuinfo
vol.py -f memory_dump.img linux_pslist
The get a list of processes I use the following command:
vol.py -f memory_dump.img linux_pstree
To get a list of open tcp connections I use the following command:
vol.py -f memory_dump.img linux_netstat
To reveal the ip adress from memory I'll use the following command:
Identify applications which are using promiscious connections:
Reveal bash command history:
vol.py -f memory_dump.img linux_bash