Praetorian503 Posted January 24, 2013 Report Posted January 24, 2013 Description: In this video I will show you Commands of Volatility Framework for Malware and Rootkit analysisCommands list./vol.py –f zeus.vmem pslistTo list the processes of a system, use the pslist command../vol.py –f zeus.vmem malfindYou can use it to find hidden or injected code/DLLs in user mode memory./vol.py –f zeus.vmem ldrmodulesTo find out the hidden dll./vol.py –f zeus.vmem apihooksTo find API hooks in user mode or kernel mode./vol.py –f zeus.vmem idtIDT (Interrupt Descriptor Table)./vol.py –f zeus.vmem gdtGdt (Global Descriptor Table)./vol.py –f zeus.vmem threads –LThe command gives you extensive details on threads./vol.py –f zeus.vmem callbacksCallbacks for detecting Windows kernel use of these callbacks to monitor and/or react to events../vol.py –f zeus.vmem driverirpTo print a driver's IRP Major Function table./vol.py –f zeus.vmem devicetreeWindows uses a layered driver architecture./vol.py –f zeus.vmem psxviewThis plugin helps you detect hidden processes.Source : - Wiki Pages - volatility - An advanced memory forensics framework - Google Project HostingDisclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.Original Source: Source: Volatility - Malware And Rootkits Command Usage Quote