ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Memory Forensic
Investigating Memory Artefact
http://xathrya.id/ 1
Satria Ady Pradana@ Universitas Atma Jaya Yogyakarta
29 April 2017
Workshop
# Whoami?
? Cyber Security Consultant at Mitra Integrasi
Informatika (MII)
? Researcher at dracOs Dev Team
? Coordinator of Reversing.ID
http://xathrya.id/ 2
Organization
? Divided to some sections related to forensic
stages.
? Each section has objectives
? Has background explanation if necessary
http://xathrya.id/ 3
Overview
? Engage in practical forensic activity
? Acquisition
¨C Windows Memory Acquisition
? Analysis
¨C Process & DLLs
¨C Registry
¨C Connections
http://xathrya.id/ 4
Assumption
? Have understanding of simple UNIX command
(explained in previous workshop)
http://xathrya.id/ 5
Windows
Brief Introduction to Our Target¡¯s Internal
http://xathrya.id/ 6
Volatility
Tools of the Trade
http://xathrya.id/ 7
Profile?
? Each operating system has different internal
structure
? Event for minor version different
? Volatility needs to know what type of system our
memory dump came from, so it knows which data
structures, algorithms, and symbols to use.
? List all profiles
$ vol.py --info
http://xathrya.id/ 8
Command Line
? Typical command
$ vol.py ¨Cf memdump.img --profile profile plugins
? Every command / task is implemented as plugin
http://xathrya.id/ 9
Preliminary
$ export VOLATILITY_PROFILE=Win7SP0x86
$ export
VOLATILITY_LOCATION=file:///tmp/image.img
$ vol.py pslist
$ vol.py files
http://xathrya.id/ 10
0x1 Acquisition
Objectives:
? Understanding the memory (RAM) and
volatile data.
? Understanding the acquisition technique for
memory forensic.
? Know how to dump memory on Windows
http://xathrya.id/ 11
? Acquisition can be hardware based or
software based.
? Hardware based, require special hardware and
has capability of DMA.
¨C Firewire (IEEE 1394)
? But we are talking about software based.
http://xathrya.id/ 12
Tools
? DumpIt & Hibr2Bin
? Winpmem
http://xathrya.id/ 13
Image Format
? Raw
? Crash Dumps
? Hibernate
http://xathrya.id/ 14
Using DumpIt & Hibr2Bin
Producing crash dump
> DumpIt.exe
Converting Hibernate File
> Hibr2Bin.exe
http://xathrya.id/ 15
Using Winpmem
Producing dump in AFF4 compression
> winpmem.exe -o imagedump.aff4
Export to raw from AFF4
> winpmem.exe imagedump.aff4 ¨Cexport
PhysicalMemory -o memory.img
Producing raw dump
> winpmem.exe imagedump.aff4 ¨Cexport
PhysicalMemory -o memory.img
http://xathrya.id/ 16
Vmware Memory Dump
? Applied to OS running on top of Vmware
? To generate memory dump, we should
suspend the running VM
¨C It will generate a .vmem file
http://xathrya.id/ 17
VirtualBox Memory Dump
? Applied to OS running on top of VirtualBox
? Start VM and use Vboxmanage
$ vboxmanage debugvm ¡°GuestVM¡± dumpguestcore
--filename dump.elf
http://xathrya.id/ 18
CHECKING IMAGE
Information
http://xathrya.id/ 19
? Gain information about memory dump
$ vol.py imageinfo
http://xathrya.id/ 20
PROCESS & DLL
View & Dump
http://xathrya.id/ 21
View
? List all process
$ vol.py pslist
$ vol.py psscan
$ vol.py pstree
$ vol.py psxview
$ vol.py privs
Different?
http://xathrya.id/ 22
View
? List all threads
$ vol.py threads
$ vol.py thrdscan
Different?
http://xathrya.id/ 23
View
? List modules/libraries of process (ex: pid 135)
$ vol.py dlllist ¨Cp 135
http://xathrya.id/ 24
Dump
? Dump process
$ vol.py procdump -p 135 --dump-dir
/tmp/procdump
? Dump DLL
$ vol.py dlldump -p 135 ¨Cdump-dir
/tmp/dlldump
http://xathrya.id/ 25
CONNECTIONS
IP, Port, Sockets
http://xathrya.id/ 26
? List connections made
$ vol.py connscan
$ vol.py netscan
? List opened sockets
$ vol.py sockets
$ vol.py sockscan
http://xathrya.id/ 27
REGISTRY
http://xathrya.id/ 28
View
$ vol.py hivelist
$ vol.py hivescan
http://xathrya.id/ 29
FILES
http://xathrya.id/ 30
? Scan opened files in memory
$ vol.py files
? Dump files
$ vol.py dumpfiles
http://xathrya.id/ 31
CHALLENGE: ANALYZE
COMPROMISED HOST
http://xathrya.id/ 32

More Related Content

Memory Forensic: Investigating Memory Artefact (Workshop)