There is more...

If you are planning to use Volatility for memory forensic analysis (and we highly recommend it, because it is the most powerful tool, with lots of plugins, and also it is free and open source), it's very important to choose the right profile. To do this, you will need to know the system type, operating system version, and build number. As you have already learned from the previous recipes, the imageinfo plugin can help you with this task if this information wasn't properly documented during the acquisition stage.

Table 2.1 contains information about profiles added to the most recent version of the Volatility Framework at the time of writing.

OS Build Profile
Windows 10 x64 10.0.10586.306 Win10x64_10586
Windows 10 x64 10.0.14393.0 Win10x64_14393
Windows 10 x86 10.0.10586.420 Win10x86_10586
Windows 10 x86 10.0.14393.0 Win10x86_14393
Windows Server 2008 R2 SP1 x64 6.1.7601.23418 Win2008R2SP1x64_23418
Windows Server 2008 R2 x64 6.3.9600.18340 Win2012R2x64_18340
Windows 7 SP1 x64 6.1.7601.23418 Win7SP1x64_23418
Windows 7 SP1 x86 6.1.7601.23418 Win7SP1x86_23418
Windows 8 x64 6.3.9600.18340 Win8SP1x64_18340
Table 2.1. Volatility 2.6 profiles list

Also, it's important to note that on all x64 Windows 8/2012 (and later), the KDBG (which contains a list of the running processes and loaded kernel modules) is encrypted by default, so you should use the virtual address of KdCopyDataBlock. Both addresses can be collected with the kdbgscan Volatility plugin.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.13.201