Memory Forensics
Last updated
Last updated
Lets Download Volatility from here. Then lets unzip the file, copy it to /usr/local/bin
and give it some permissions.
Lets download the files and start Volatility specifying a file. Lets dump the passwords and save them into a file called credentials
.
We have a password hash, lets crack it using John The Ripper
We have the password
Lets download the files
To check when the machine was last shutdown, we have an option for that in Volatility, lets use it.
We have the time and date.
Now we have to see what john wrote in the console, so lets use the console option that will allow us to look at the past commands the user used.
Lets download the files, once we do , lets use the truecryptpassphrase option to get the passphrase.
We are done with the room.