Skip to content

Instantly share code, notes, and snippets.

@Reelix
Created September 9, 2022 18:56
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Reelix/bd546ed9bb9834ecc17fb577029bf445 to your computer and use it in GitHub Desktop.
Save Reelix/bd546ed9bb9834ecc17fb577029bf445 to your computer and use it in GitHub Desktop.
Reelix's Volatility Cheatsheet
0.) Update: https://www.volatilityfoundation.org/releases
1.) General analysis (Mainly used to get Profiles)
- volatility.exe -f file.raw imageinfo
Eg: Suggested Profile(s) : Win7SP1x64, WinXPSP2x86, WinXPSP3x86
2.) List Processes
- volatility.exe -f file.raw --profile=ProfileFromAbove pslist
3.) List loaded DLL's
- volatility.exe -f file.raw --profile=ProfileFromAbove dlllist
4.) Show network connections (May not work on older images) - IPs / Ports
- volatility.exe -f file.raw --profile=ProfileFromAbove netscan
5.) View processes (Including Hidden)
- volatility.exe -f file.raw --profile=ProfileFromAbove psxview
6.) Potentially suspicious processes (3 Falses is bad!)
- volatility.exe -f file.raw --profile=ProfileFromAbove ldrmodules | grep False
7.) Dump DLL's from PID
- volatility.exe -f file.raw --profile=ProfileFromAbove --pid=123 dlldump -D .\Mem
7.b) Dump Memory from PID
- volatility.exe -f file.raw --profile=ProfileFromAbove --pid=1,2,3 memdump -D .\Mem
8.) Find files
- volatility.exe -f file.raw --profile=ProfileFromAbove filescan
8.b.) Find .txt files
- volatility.exe -f file.raw --profile=ProfileFromAbove filescan | findstr ".txt"
9.) Save files (Not every file is stored so may be buggy)
- volatility.exe -f file.raw --profile=ProfileFromAbove dumpfiles -Q aboveRamADD --name file -D Files
10.) Dump SAM + System for Password Cracking
- volatility.exe -f file.raw --profile=ProfileFromAbove hivelist
-- Search for \SystemRoot\System32\Config\SAM and \REGISTRY\MACHINE\SYSTEM
--- volatility.exe -f file.raw --profile=ProfileFromAbove hashdump -y LeftSystemHash -s LeftSamHash > hashes.txt
---- Save furthest right hash
----- hashcat hash.txt -m 1000 R:\Dictionarys\rockyou.txt -O
11.) Check if there's a TrueCrypt Partition + Extract Password
- volatility.exe -f file.raw --profile=ProfileFromAbove truecryptsummary
11.b.) If there is - Try and extract the master key
- volatility.exe -f file.raw --profile=ProfileFromAbove truecryptmaster -D .
12.) Most recently used files / folders
- volatility.exe -f file.raw --profile=ProfileFromAbove shellbags --output=body
12.b.) Most recently used dirs
- volatility.exe -f file.raw --profile=ProfileFromAbove shellbags --output=body | findstr "DIR"
-- Dates are: Modified | Create | Access
13.) List recent command line entries
- volatility.exe -f file.raw --profile=ProfileFromAbove cmdscan
14.) List command line history (Input + Output)
- volatility.exe -f file.raw --profile=ProfileFromAbove consoles
15.) List Environment Variables
- volatility.exe -f file.raw --profile=ProfileFromAbove envars
15.b) List Environment Variables from a specific process
- volatility.exe -f file.raw --profile=ProfileFromAbove -p123 envars
16.) What's on a currently opened notepad document
- volatility.exe -f file.raw --profile=ProfileFromAbove notepad
17.) What's on the clipboard
- volatility.exe -f file.raw --profile=ProfileFromAbove clipboard
- volatility.exe -f file.raw --profile=ProfileFromAbove clipboard -v
18.) List possible malicious processes (Vads tag + execute protection)
- volatility.exe -f file.raw --profile=ProfileFromAbove malfind
19.) Last shutdown time
- volatility.exe -f file.raw --profile=ProfileFromAbove shutdowntime
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment