Day 19
Memory forensics CrypTOYminers Sing Volala-lala-latility
Learning Objectives
Understand what memory forensics is and how to use it in a digital forensics investigation
Understand what volatile data and memory dumps are
Learn about Volatility and how it can be used to analyse a memory dump
Learn about Volatility profiles
Memory forensics, also known as volatile memory analysis or random access memory (RAM) forensics, is a branch of digital forensics.
It involves the examination and analysis of a computer's volatile memory (RAM) to uncover digital evidence and artefacts related to computer security incidents, cybercrimes, and other forensic investigations.
This type of data is volatile because it will be deleted when the computer is turned off.
This room is again a very straightforward one with all commands and instructions already given. We just need to follow along and run them.
What is the exposed password that we find from the bash history output? Submit
[REDACTED]
ubuntu@volatility:~/Desktop/Evidence$ vol.py -f linux.mem --profile="LinuxUbuntu_5_4_0-163-generic_profilex64" linux_bash
Volatility Foundation Volatility Framework 2.6.1
Pid Name Command Time Command
-------- ---- ----------------------------- -------
10205 bash 2023-10-02 18:19:58 UTC+0000 mysql -u root -p'REDACTED'Last updated
Was this helpful?