Memory Analysis is the science of using a memory image to determine information about running programs, the operating system, and the overall state of a computer. Because the analysis is highly dependent on the operating system, it has been divded into the following pages:
At the IEEE Security and Privacy conference in May 2011, Brendan Dolan-Gavitt presented a novel system, Virtuoso, that was able to perform operating-system independent memory analysis. Using virtual machine introspection accompanied by a number of formal program analysis techniques, his system was able to monitor the machine-level instructions and behavior of application actions (listing processes, network connections, etc) and then automatically generate Volatility plugins that replicated this analysis.
Various types of encryption keys can be extracted during memory analysis.
- AESKeyFinder extracts 128-bit and 256-bit AES keys and RSAKeyFinder and private and public RSA keys from a memory dump .
- cryptoscan.py, which is a plugin for the Volatility framework, scans a memory image for TrueCrypt passphrases
- MoVP 1.1 Logon Sessions, Processes, and Images
- MoVP 1.2 Window Stations and Clipboard Malware
- MoVP 1.3 Desktops, Heaps, and Ransomware
- MoVP 1.4 Average Coder Rootkit, Bash History, and Elevated Processes
- MoVP 1.5 KBeast Rootkit, Detecting Hidden Modules, and sysfs
- MoVP 2.1 Atoms (The New Mutex), Classes and DLL Injection
- MoVP 2.2 Malware In Your Windows
- MoVP 2.3 Event Logs and Service SIDs
- MoVP 2.4 Analyzing the Jynx rootkit and LD_PRELOAD
- MoVP 2.5: Investigating In-Memory Network Data with Volatility
- MoVP 3.1 Detecting Malware Hooks in the Windows GUI Subsystem
- HowTo: Scan for Internet Cache/History and URLs
- MoVP 3.2 Shellbags in Memory, SetRegTime, and TrueCrypt Volumes
- MoVP 3.3 Analyzing USER Handles and the Win32k.sys Gahti
- MoVP 3.4: Recovering tagCLIPDATA: What's In Your Clipboard?
- MoVP 3.5: Analyzing the 2008 DFRWS Challenge with Volatility
- MoVP 4.1 Detecting Malware with GDI Timers and Callbacks
- MoVP 4.2 Taking Screenshots from Memory Dumps
- MoVP 4.3 Recovering Master Boot Records (MBRs) from Memory
- MoVP 4.4 Cache Rules Everything Around Me(mory)
- OMFW 2012: Malware In the Windows GUI Subsystem
- OMFW 2012: Reconstructing the MBR and MFT from Memory
- Phalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkit