How to retrieve user’s passwords from a Windows memory dump using Volatility

About Volatility i have written a lot of tutorials, now let’s try to use this information in a real context extracting the password hashes from a windows memory dump, in 4 simple steps. 1. Identify the memory profile First, we need to identify the correct profile of the system: [email protected]:~# …

Volatility, my own cheatsheet (Part 8): Filesystem

With this part, we ended the series dedicated to Volatility: the last ‘episode’ is focused on file system. If you want to read the other parts, take a look to this index: Image Identification Processes and DLLs Process Memory Kernel Memory and Objects Networking Windows Registry Analyze and convert crash dumps …

Volatility, my own cheatsheet (Part 7): Analyze and convert crash dumps and hibernation files

Volatility supports memory dumps in several different formats, to ensure the highest compatibility with different acquisition tools. You can analyze hibernation files, crash dumps, virtualbox core dumps, etc in the same way as any raw memory dump and Volatility will detect the underlying file format and apply the appropriate address …

Volatility, my own cheatsheet (Part 6): Windows Registry

Volatility has the ability to carve the Windows registry data. (Other articles about Volatility: https://andreafortuna.org/category/volatility) hivescan To find the physical addresses of CMHIVEs (registry hives) in memory, use the hivescan command. For more information: Enumerating Registry Hives The Windows registry can be an important forensic resource. Harlan Carvey has written extensively …