电子说
volatility -f [image] --profile=[profile] [plugin]
在分析之前,需要先判断当前的镜像信息,分析出是哪个操作系统volatility -f xxx.vmem imageinfo
volatility -f 1.vmem --profile=Win7SP1x64 hashdump
volatility -f 1.vmem --profile=Win7SP1x64 pslist
volatility -f 1.vmem --profile=Win7SP1x64 svcscan
volatility -f 1.vmem --profile=Win7SP1x64 iehistory
volatility -f 1.vmem --profile=Win7SP1x64 netscan
volatility -f 1.vmem --profile=Win7SP1x64 cmdscan
volatility -f 1.vmem --profile=Win7SP1x64 filescan
volatility -f 1.vmem --profile=Win7SP1x64 dumpfiles -Q 0xxxxxxxx -D ./
volatility -f 1.vmem --profile=Win7SP1x64 notepad
volatility -f 1.vmem --profile=Win7SP1x64 memdump -p xxx --dump-dir=./
volatility -f 1.vmem --profile=Win7SP1x64 screenshot --dump-dir=./
volatility -f 1.vmem --profile=Win7SP1x64 hivelist
volatility -f 1.vmem --profile=Win7SP1x64 hivedump -o 0xfffff8a001032410
volatility -f 1.vmem --profile=Win7SP1x64 printkey -K "xxxxxxx"
volatility -f 1.vmem --profile=Win7SP1x64 userassist
volatility -f 1.vmem --profile=Win7SP1x64 timeliner
volatility -f easy_dump.img imageinfo
#脚本文件 import matplotlib.pyplot as plt import numpy as np x = [] y = [] with open('hint.txt','r') as f: datas = f.readlines() for data in datas: arr = data.split(' ') x.append(int(arr[0])) y.append(int(arr[1])) plt.plot(x,y,'ks',ms=1) plt.show()
扫描二维码得到提示,一个是维吉尼亚加密,秘钥是aeolus。一个是加密文件被删除了,需要恢复。
审核编辑 :李倩
全部0条评论
快来发表一下你的评论吧 !