Memory Forensics

Task 2: Login

Lets Download Volatility from here. Then lets unzip the file, copy it to /usr/local/bin and give it some permissions.

Lets download the files and start Volatility specifying a file. Lets dump the passwords and save them into a file called credentials.

We have a password hash, lets crack it using John The Ripper

We have the password

Task 3: Analysis

Lets download the files

To check when the machine was last shutdown, we have an option for that in Volatility, lets use it.

We have the time and date.

Now we have to see what john wrote in the console, so lets use the console option that will allow us to look at the past commands the user used.

Task 4: TrueCrypt

Lets download the files, once we do , lets use the truecryptpassphrase option to get the passphrase.

We are done with the room.

Last updated