Memory Analysis - Volatility3
Memory Analysis using Volatility3
Theory
Volatility is an open-source memory forensics framework for incident response and malware analysis. It is written in Python and supports Microsoft Windows, Mac OS X, and Linux. Volatility was created by Aaron Walters, drawing on academic research he did in memory forensics.
Volatility3 Commands
OS Information
OS Information
vol.py -f “/path/to/file” windows.infoProcess Information
pslist
vol.py -f “/path/to/file” windows.pslist
vol.py -f “/path/to/file” windows.psscan
vol.py -f “/path/to/file” windows.pstreecmdline
vol.py -f “/path/to/file” windows.cmdlineDLLs
vol.py -f “/path/to/file” windows.dlllist ‑‑pid <PID>Network Information
netscan
vol.py -f “/path/to/file” windows.netscan
vol.py -f “/path/to/file” windows.netstatRegistry
hivelist
vol.py -f “/path/to/file” windows.registry.hivescan
vol.py -f “/path/to/file” windows.registry.hivelistFiles
Filescan
vol.py -f “/path/to/file” windows.filescanFiledump
vol.py -f “/path/to/file” -o “/path/to/dir” windows.dumpfiles
vol.py -f “/path/to/file” -o “/path/to/dir” windows.dumpfiles ‑‑virtaddr <offset>
vol.py -f “/path/to/file” -o “/path/to/dir” windows.dumpfiles ‑‑physaddr <offset>Miscellaneous
Yarascan
vol.py -f “/path/to/file” windows.vadyarascan ‑‑yara-rules <string>
vol.py -f “/path/to/file” windows.vadyarascan ‑‑yara-file “/path/to/file.yar”
vol.py -f “/path/to/file” yarascan.yarascan ‑‑yara-file “/path/to/file.yar”REFERENCES
Last updated
Was this helpful?