Day 19

Memory forensics CrypTOYminers Sing Volala-lala-latility

Learning Objectives

  • Understand what memory forensics is and how to use it in a digital forensics investigation

  • Understand what volatile data and memory dumps are

  • Learn about Volatility and how it can be used to analyse a memory dump

  • Learn about Volatility profiles

Memory forensics, also known as volatile memory analysis or random access memory (RAM) forensics, is a branch of digital forensics.

It involves the examination and analysis of a computer's volatile memory (RAM) to uncover digital evidence and artefacts related to computer security incidents, cybercrimes, and other forensic investigations.

This type of data is volatile because it will be deleted when the computer is turned off.

This room is again a very straightforward one with all commands and instructions already given. We just need to follow along and run them.

What is the exposed password that we find from the bash history output? Submit
[REDACTED]

ubuntu@volatility:~/Desktop/Evidence$ vol.py -f linux.mem --profile="LinuxUbuntu_5_4_0-163-generic_profilex64" linux_bash

Volatility Foundation Volatility Framework 2.6.1
Pid      Name Command Time                   Command
-------- ---- ----------------------------- -------
10205    bash 2023-10-02 18:19:58 UTC+0000   mysql -u root -p'REDACTED'

Last updated

Was this helpful?