Time: This activity should take you approximately 30–60 minutes to complete.
SIFT Workstation 3
Note: This activity takes place in a Linux system environment using SANS SIFT Workstation, a collection of forensic tools. For instructions to download and set up this environment, click Virtual Workstation in the toolbar.
If you prefer to work on your own system, you can download the latest version of Volatility from The Volatility Foundation. Volatility supports Windows, Mac OS X, and Linux platforms.
Volatility download linkDocumentation, including a list of image types that Volatility can analyzeThe Malware Analyst’s Cookbook DVD contains an image file you will use during the activity.
Malware Analyst’s Cookbook DVD download link (.zip file)Extract the zip file and save it to your desktop. In the activity you will use the Zeus memory sample in the folder named “17” and in the sub folder “1.” Zeus is a malware designed to steal credentials.The open-source toolkit, Volatility framework, is one of the best memory forensic analysis tools to extract valuable information from a memory dump or a .vmem file. In this activity, you will practice volatility’s basic plugins for extracting valuable information from a memory image.
In my demonstration video Volatility for Memory Analysis Demo, I use the Zeus memory image from the Malware Analyst’s Cookbook. You can use that file for the activities as well as your own memory images or .vmem files.
If you are interested in learning other plugins that are not covered in the lecture, you can refer to the Volatility Command Reference.
Answer the Check Your Work questions.
转载于:https://www.cnblogs.com/sec875/articles/10015680.html