Nytro Posted October 31, 2011 Report Posted October 31, 2011 Volatility 2.0 - Advanced Memory Forensics [With Video Demonstration]POSTED BY THN REPORTER ON 10/30/2011 03:10:00 AMThe Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.The Volatility Framework demonstrates our committment to and belief in the importance of open source digital investigation tools . Volatile Systems is committed to the belief that the technical procedures used to extract digital evidence should be open to peer analysis and review. We also believe this is in the best interest of the digital investigation community, as it helps increase the communal knowledge about systems we are forced to investigate. Similarly, we do not believe the availability of these tools should be restricted and therefore encourage people to modify, extend, and make derivative works, as permitted by the GPL.CapabilitiesThe Volatility Framework currently provides the following extraction capabilities for memory samplesImage date and time:Running processesOpen network socketsOpen network connectionsDLLs loaded for each processOpen files for each processOpen registry handles for each processA process' addressable memoryOS kernel modulesMapping physical offsets to virtual addresses (strings to process)Virtual Address Descriptor informationScanning examples: processes, threads, sockets, connections,modulesExtract executables from memory samplesTransparently supports a variety of sample formats (ie, Crash dump, Hibernation, DD)Automated conversion between formatsVideo Demonstration:This video shows grabbing the windows NTLM passwords from a memory dump and then using John the Ripper to crack them.Video:http://www.youtube.com/watch?v=YO1mlynbsmcDownload:https://www.volatilesystems.com/default/volatilitySursa: Volatility 2.0 - Advanced Memory Forensics [With Video Demonstration] ~ THN : The Hacker News Quote