Hacks Weekly #6: Memory Dump Analysis - extracting juicy data

Поделиться
HTML-код
  • Опубликовано: 26 окт 2024

Комментарии • 57

  • @calmeidazim
    @calmeidazim 8 лет назад +5

    Great video, thank you Paula

  • @Pem7
    @Pem7 5 месяцев назад +1

    Good work and content 🤞🏾

    • @CQUREAcademy
      @CQUREAcademy  4 месяца назад

      Thank you, we're glad that you enjoyed this video!

  • @J_BALVIN_007
    @J_BALVIN_007 3 года назад +1

    I first read it and then heard it🤣
    thanks for both blog and video

  • @menatoorus5696
    @menatoorus5696 5 лет назад +1

    Paula , you are the Woman!!

  • @Tom-ms5ot
    @Tom-ms5ot 4 года назад +1

    Hello Paula !! Thank you very much !

  • @OthmanAlikhan
    @OthmanAlikhan 2 месяца назад

    Thanks for the video =)

    • @CQUREAcademy
      @CQUREAcademy  2 месяца назад

      Great to hear that you found it useful!

  • @benoit.gerin-lajoie
    @benoit.gerin-lajoie Год назад

    Hi Paula ! GREAT Tuto... KUDO !
    I have a program password to fetch in memory dump for when I set it up, I must have made a typo for I can no more open my program with the correct pswd. I saw your minikatz extension "LogonPasswords" can uncover all the websites logon passwords in the dump. BUT... if I don't want websites logons but a specific program password that I tried tens of time, what could be the minikatz proper extension to use for that ? Is there an extension to fetch strings in clear in the dump or are they all crypted ?

  • @HiiIam-y6w
    @HiiIam-y6w Год назад

    if a malware gets installed in bios or registry.will the dump file have the capability to capture the details of it?

  • @renelguillaumeable
    @renelguillaumeable 6 лет назад +3

    Hello thanks for the tutorial! but People always focus on Dump for windows why not for Linux? i would like tu edit each process of the pslist command one by one. could you help me please?

  • @robinsaifullah6692
    @robinsaifullah6692 Год назад

    wow..nice

  • @josebello61
    @josebello61 7 лет назад +1

    It was very interesting, but I can´t find the links for the tolls :)

  • @hashimmirdad8678
    @hashimmirdad8678 4 года назад

    Dear how to get all the software for memory analysis can you share your software if it is possible.

  • @selfmade5783
    @selfmade5783 3 года назад

    Hello Team, I've a 5gb memory dump file. Please help me how to read that file

  • @neelpathak007
    @neelpathak007 8 лет назад +2

    I have a question here. If you happen to dump memory from the pc that you mentioned before the tutorial, didn't it asked for admin privileges?

  • @leemabeckshire1854
    @leemabeckshire1854 5 лет назад +1

    Anytime i run volatility with python it gives me this errors *** Failed to import volatility.plugins.malware.apihooks (NameError: name 'distorm3' is not defined)
    *** Failed to import volatility.plugins.malware.threads (NameError: name 'distorm3' is not defined)
    *** Failed to import volatility.plugins.mac.apihooks_kernel (ImportError: Error loading the diStorm dynamic library (or cannot load library into process).)
    *** Failed to import volatility.plugins.mac.check_syscall_shadow (ImportError: Error loading the diStorm dynamic library (or cannot load library into process).)
    *** Failed to import volatility.plugins.ssdt (NameError: name 'distorm3' is not defined)
    *** Failed to import volatility.plugins.mac.apihooks (ImportError: Error loading the diStorm dynamic library (or cannot load library into process).)
    ERROR : volatility.debug : You must specify something to do (try -h) even tho i have installed Pycrypto and Distorm3 i still get this errors why? Please i need help

  • @chaitanyamungi5096
    @chaitanyamungi5096 2 года назад

    can accessing memory of a process from other process be called as meltdown??

  • @alexanderbreaden6639
    @alexanderbreaden6639 6 лет назад

    How can i get the python scripts you used in the video?

  • @raoufmorsi5304
    @raoufmorsi5304 3 года назад

    Hello thank you for the video, i had a question, i want to extract files loaded by a process foe example ( extracting png file loaded in paint.exe) i use volatility.

    • @CQUREAcademy
      @CQUREAcademy  3 года назад +1

      It's an excellent question Raouf!
      To extract files from the process using volatility you need to run the following command:
      vol.py -f yourdump.dmp --profile= dumpfiles -n -p -D

    • @raoufmorsi5304
      @raoufmorsi5304 3 года назад

      @@CQUREAcademy hmm yeah that's what I did but I didn't get the file I was looking for, I thought there was another way to do it, I'll double-check, thank you for your responsiveness

    • @CQUREAcademy
      @CQUREAcademy  3 года назад +1

      @@raoufmorsi5304 Investigate and let us know!

  • @telintservicio
    @telintservicio 3 года назад

    Very intelligent

  • @MalaiischeIntelligez
    @MalaiischeIntelligez 4 года назад +4

    next time lock your computer every time you go for poo

  • @pandiyan1982
    @pandiyan1982 3 года назад

    Hi, I forgot trueCrypt file password, it's 15 letters password like (aA#@123) it possible to recovery??

    • @CQUREAcademy
      @CQUREAcademy  3 года назад

      Currently, it's not possible.

    • @pandiyan1982
      @pandiyan1982 3 года назад

      @@CQUREAcademy local memory file (hiberfil.sys) use to recovery the password is possible?

  • @hulkmarvel9359
    @hulkmarvel9359 4 года назад

    More videos pls

  • @worldsmusic5068
    @worldsmusic5068 3 года назад

    is it possible to extract image files or something like from dump file?

    • @CQUREAcademy
      @CQUREAcademy  3 года назад

      Yes, it is possible to extract some files from a memory dump. As shown in the video, Paula has successfully extracted .evtx files cached in the memory containing events from various logs. You can find more detailed information here in Volatility documentation: github.com/volatilityfoundation/volatility/wiki/Command-Reference#dumpfiles. Surely there are also other examples of things possible to extract using the volatility framework used during the demo, for example, you can dump DLLs loaded into memory and further analyze it: github.com/volatilityfoundation/volatility/wiki/Command-Reference#dlldump

    • @worldsmusic5068
      @worldsmusic5068 3 года назад

      @@CQUREAcademy VERY GOOD!!!!!!!! THANK YOU SO MUCH YOUR REPLY AND HELP

  • @imdonkeykonga
    @imdonkeykonga 4 года назад +1

    and that is why kids we dont use windows :v CHEERS!?

  • @Pdr-sf4hm
    @Pdr-sf4hm 7 лет назад +1

    Dzien dobry :) i got a question :) why is when i do this process of the logonpassword, my password shows (Null) :) ? dzienkuje

    • @jezz83
      @jezz83 7 лет назад +3

      Pedro which OS memory? in win 10 the should be no passwords in memory (with some exceptions). But still you may find ntlm hashes which may be used in PtH attack.

    • @Pdr-sf4hm
      @Pdr-sf4hm 7 лет назад

      Filip Rejch actually is windows 10 :) thank you for the reply :)

  • @Бываеттак-ь7л
    @Бываеттак-ь7л 5 лет назад

    В юбке смотрелась бы лучше

  • @NoBreakz
    @NoBreakz 4 года назад

    This is why you dont get free usb drives

  • @efraimg8543
    @efraimg8543 4 года назад

    1:39 in a two days episode? what? where? :D

  • @turbowhizkid3171
    @turbowhizkid3171 2 года назад

    Sounds like it's time to dump Windows.

    • @xenostim
      @xenostim Год назад

      dump windows, or at least lock windows when you go take a dump

  • @Ruhgtfo
    @Ruhgtfo 5 лет назад

    holy shat

  • @VicTor-qf8qf
    @VicTor-qf8qf 6 лет назад

    I will only like it if I don’t have to download tools 👎🏻

    • @bettycole9233
      @bettycole9233 3 года назад

      Buy your creditcard with high balance from @Darkteckh on telegram dumps with pin that comes with MSR i got mine from him

  • @neelpathak007
    @neelpathak007 8 лет назад

    I have a question here. If you happen to dump memory from the pc that you mentioned before the tutorial, didn't it asked for admin privileges?

    • @pjanuszkiewicz
      @pjanuszkiewicz 8 лет назад +1

      Hey! Of course - in order to do the memory dump of the WHOLE operating system you need to have the administrative privileges. After attack happens and this is your server I guess you do have them anyway :) Tell me if you have more questions!