-
Plugins de volatility 2
Instalada desde el repo de github:
# Windows amcache # Print AmCache information apihooks # Detect API hooks in process and kernel memory atoms # Print session and window station atom tables atomscan # Pool scanner for atom tables auditpol # Prints out the Audit Policies from HKLM\SECURITY\Policy\PolAdtEv bigpools # Dump the big page pools using BigPagePoolScanner bioskbd # Reads the keyboard buffer from Real Mode memory cachedump # Dumps cached domain hashes from memory callbacks # Print system-wide notification routines clipboard # Extract the contents of the windows clipboard cmdline # Display process command-line arguments cmdscan # Extract command history by scanning for _COMMAND_HISTORY connections # Print list of open connections [Windows XP and 2003 Only] connscan # Pool scanner for tcp connections consoles # Extract command history by scanning for _CONSOLE_INFORMATION crashinfo # Dump crash-dump information deskscan # Poolscaner for tagDESKTOP (desktops) devicetree # Show device tree dlldump # Dump DLLs from a process address space dlllist # Print list of loaded dlls for each process driverirp # Driver IRP hook detection drivermodule # Associate driver objects to kernel modules driverscan # Pool scanner for driver objects dumpcerts # Dump RSA private and public SSL keys dumpfiles # Extract memory mapped and cached files dumpregistry # Dumps registry files out to disk editbox # Displays information about Edit controls. (Listbox experimental.) envars # Display process environment variables eventhooks # Print details on windows event hooks evtlogs # Extract Windows Event Logs (XP/2003 only) filescan # Pool scanner for file objects gahti # Dump the USER handle type information gditimers # Print installed GDI timers and callbacks gdt # Display Global Descriptor Table getservicesids # Get the names of services in the Registry and return Calculated SID getsids # Print the SIDs owning each process handles # Print list of open handles for each process hashdump # Dumps passwords hashes (LM/NTLM) from memory hibinfo # Dump hibernation file information hivedump # Prints out a hive hivelist # Print list of registry hives. hivescan # Pool scanner for registry hives hpakextract # Extract physical memory from an HPAK file hpakinfo # Info on an HPAK file idt # Display Interrupt Descriptor Table iehistory # Reconstruct Internet Explorer cache / history imagecopy # Copies a physical address space out as a raw DD image imageinfo # Identify information for the image impscan # Scan for calls to imported functions joblinks # Print process job link information kdbgscan # Search for and dump potential KDBG values kpcrscan # Search for and dump potential KPCR values ldrmodules # Detect unlinked DLLs limeinfo # Dump Lime file format information lsadump # Dump (decrypted) LSA secrets from the registry machoinfo # Dump Mach-O file format information malfind # Find hidden and injected code mbrparser # Scans for and parses potential Master Boot Records (MBRs) memdump # Dump the addressable memory for a process memmap # Print the memory map messagehooks # List desktop and thread window message hooks mftparser # Scans for and parses potential MFT entries moddump # Dump a kernel driver to an executable file sample modscan # Pool scanner for kernel modules modules # Print list of loaded modules multiscan # Scan for various objects at once mutantscan # Pool scanner for mutex objects netscan # Scan a Vista (or later) image for connections and sockets notepad # List currently displayed notepad text objtypescan # Scan for Windows object type objects patcher # Patches memory based on page scans poolpeek # Configurable pool scanner plugin pooltracker # Show a summary of pool tag usage printkey # Print a registry key, and its subkeys and values privs # Display process privileges procdump # Dump a process to an executable file sample pslist # Print all running processes by following the EPROCESS lists psscan # Pool scanner for process objects pstree # Print process list as a tree psxview # Find hidden processes with various process listings qemuinfo # Dump Qemu information raw2dmp # Converts a physical memory sample to a windbg crash dump screenshot # Save a pseudo-screenshot based on GDI windows servicediff # List Windows services (ala Plugx) sessions # List details on _MM_SESSION_SPACE (user logon sessions) shellbags # Prints ShellBags info shimcache # Parses the Application Compatibility Shim Cache registry key shutdowntime # Print ShutdownTime of machine from registry sockets # Print list of open sockets sockscan # Pool scanner for tcp socket objects ssdt # Display SSDT entries strings # Match physical offsets to virtual addresses (may take a while, VERY verbose) svcscan # Scan for Windows services symlinkscan # Pool scanner for symlink objects thrdscan # Pool scanner for thread objects threads # Investigate _ETHREAD and _KTHREADs timeliner # Creates a timeline from various artifacts in memory timers # Print kernel timers and associated module DPCs truecryptmaster # Recover TrueCrypt 7.1a Master Keys truecryptpassphrase # TrueCrypt Cached Passphrase Finder truecryptsummary # TrueCrypt Summary unloadedmodules # Print list of unloaded modules userassist # Print userassist registry keys and information userhandles # Dump the USER handle tables vaddump # Dumps out the vad sections to a file vadinfo # Dump the VAD info vadtree # Walk the VAD tree and display in tree format vadwalk # Walk the VAD tree vboxinfo # Dump virtualbox information verinfo # Prints out the version information from PE images vmwareinfo # Dump VMware VMSS/VMSN information volshell # Shell in the memory image win10cookie # Find the ObHeaderCookie value for Windows 10 windows # Print Desktop Windows (verbose details) wintree # Print Z-Order Desktop Windows Tree wndscan # Pool scanner for window stations yarascan # Scan process or kernel memory with Yara signatures # Linux linux_apihooks # Checks for userland apihooks linux_arp # Print the ARP table linux_aslr_shift # Automatically detect the Linux ASLR shift linux_banner # Prints the Linux banner information linux_bash # Recover bash history from bash process memory linux_bash_env # Recover a process' dynamic environment variables linux_bash_hash # Recover bash hash table from bash process memory linux_check_afinfo # Verifies the operation function pointers of network protocols linux_check_creds # Checks if any processes are sharing credential structures linux_check_evt_arm # Checks the Exception Vector Table to look for syscall table hooking linux_check_fop # Check file operation structures for rootkit modifications linux_check_idt # Checks if the IDT has been altered linux_check_inline_kernel # Check for inline kernel hooks linux_check_modules # Compares module list to sysfs info, if available linux_check_syscall # Checks if the system call table has been altered linux_check_syscall_arm # Checks if the system call table has been altered linux_check_tty # Checks tty devices for hooks linux_cpuinfo # Prints info about each active processor linux_dentry_cache # Gather files from the dentry cache linux_dmesg # Gather dmesg buffer linux_dump_map # Writes selected memory mappings to disk linux_dynamic_env # Recover a process' dynamic environment variables linux_elfs # Find ELF binaries in process mappings linux_enumerate_files # Lists files referenced by the filesystem cache linux_find_file # Lists and recovers files from memory linux_getcwd # Lists current working directory of each process linux_hidden_modules # Carves memory to find hidden kernel modules linux_ifconfig # Gathers active interfaces linux_info_regs # It's like 'info registers' in GDB. It prints out all the linux_iomem # Provides output similar to /proc/iomem linux_kernel_opened_files # Lists files that are opened from within the kernel linux_keyboard_notifiers # Parses the keyboard notifier call chain linux_ldrmodules # Compares the output of proc maps with the list of libraries from libdl linux_library_list # Lists libraries loaded into a process linux_librarydump # Dumps shared libraries in process memory to disk linux_list_raw # List applications with promiscuous sockets linux_lsmod # Gather loaded kernel modules linux_lsof # Lists file descriptors and their path linux_malfind # Looks for suspicious process mappings linux_memmap # Dumps the memory map for linux tasks linux_moddump # Extract loaded kernel modules linux_mount # Gather mounted fs/devices linux_mount_cache # Gather mounted fs/devices from kmem_cache linux_netfilter # Lists Netfilter hooks linux_netscan # Carves for network connection structures linux_netstat # Lists open sockets linux_pidhashtable # Enumerates processes through the PID hash table linux_pkt_queues # Writes per-process packet queues out to disk linux_plthook # Scan ELF binaries' PLT for hooks to non-NEEDED images linux_proc_maps # Gathers process memory maps linux_proc_maps_rb # Gathers process maps for linux through the mappings red-black tree linux_procdump # Dumps a process's executable image to disk linux_process_hollow # Checks for signs of process hollowing linux_psaux # Gathers processes along with full command line and start time linux_psenv # Gathers processes along with their static environment variables linux_pslist # Gather active tasks by walking the task_struct->task list linux_pslist_cache # Gather tasks from the kmem_cache linux_psscan # Scan physical memory for processes linux_pstree # Shows the parent/child relationship between processes linux_psxview # Find hidden processes with various process listings linux_recover_filesystem # Recovers the entire cached file system from memory linux_route_cache # Recovers the routing cache from memory linux_sk_buff_cache # Recovers packets from the sk_buff kmem_cache linux_slabinfo # Mimics /proc/slabinfo on a running machine linux_strings # Match physical offsets to virtual addresses (may take a while, VERY verbose) linux_threads # Prints threads of processes linux_tmpfs # Recovers tmpfs filesystems from memory linux_truecrypt_passphrase # Recovers cached Truecrypt passphrases linux_vma_cache # Gather VMAs from the vm_area_struct cache linux_volshell # Shell in the memory image linux_yarascan # A shell in the Linux memory image # MAC mac_adium # Lists Adium messages mac_apihooks # Checks for API hooks in processes mac_apihooks_kernel # Checks to see if system call and kernel functions are hooked mac_arp # Prints the arp table mac_bash # Recover bash history from bash process memory mac_bash_env # Recover bash's environment variables mac_bash_hash # Recover bash hash table from bash process memory mac_calendar # Gets calendar events from Calendar.app mac_check_fop # Validate File Operation Pointers mac_check_mig_table # Lists entires in the kernel's MIG table mac_check_syscall_shadow # Looks for shadow system call tables mac_check_syscalls # Checks to see if system call table entries are hooked mac_check_sysctl # Checks for unknown sysctl handlers mac_check_trap_table # Checks to see if mach trap table entries are hooked mac_compressed_swap # Prints Mac OS X VM compressor stats and dumps all compressed pages mac_contacts # Gets contact names from Contacts.app mac_dead_procs # Prints terminated/de-allocated processes mac_dead_sockets # Prints terminated/de-allocated network sockets mac_dead_vnodes # Lists freed vnode structures mac_devfs # Lists files in the file cache mac_dmesg # Prints the kernel debug buffer mac_dump_file # Dumps a specified file mac_dump_maps # Dumps memory ranges of process(es) mac_dyld_maps # Gets memory maps of processes from dyld data structures mac_find_aslr_shift # Find the ASLR shift value for 10.8+ images mac_get_profile # Automatically detect Mac profiles mac_ifconfig # Lists network interface information for all devices mac_interest_handlers # Lists IOKit Interest Handlers mac_ip_filters # Reports any hooked IP filters mac_kernel_classes # Lists loaded c++ classes in the kernel mac_kevents # Show parent/child relationship of processes mac_keychaindump # Recovers possbile keychain keys. Use chainbreaker to open related keychain files mac_ldrmodules # Compares the output of proc maps with the list of libraries from libdl mac_librarydump # Dumps the executable of a process mac_list_files # Lists files in the file cache mac_list_kauth_listeners # Lists Kauth Scope listeners mac_list_kauth_scopes # Lists Kauth Scopes and their status mac_list_raw # List applications with promiscuous sockets mac_list_sessions # Enumerates sessions mac_list_zones # Prints active zones mac_lsmod # Lists loaded kernel modules mac_lsmod_iokit # Lists loaded kernel modules through IOkit mac_lsmod_kext_map # Lists loaded kernel modules mac_lsof # Lists per-process opened files mac_machine_info # Prints machine information about the sample mac_malfind # Looks for suspicious process mappings mac_memdump # Dump addressable memory pages to a file mac_moddump # Writes the specified kernel extension to disk mac_mount # Prints mounted device information mac_netstat # Lists active per-process network connections mac_network_conns # Lists network connections from kernel network structures mac_notesapp # Finds contents of Notes messages mac_notifiers # Detects rootkits that add hooks into I/O Kit (e.g. LogKext) mac_orphan_threads # Lists threads that don't map back to known modules/processes mac_pgrp_hash_table # Walks the process group hash table mac_pid_hash_table # Walks the pid hash table mac_print_boot_cmdline # Prints kernel boot arguments mac_proc_maps # Gets memory maps of processes mac_procdump # Dumps the executable of a process mac_psaux # Prints processes with arguments in user land (**argv) mac_psenv # Prints processes with environment in user land (**envp) mac_pslist # List Running Processes mac_pstree # Show parent/child relationship of processes mac_psxview # Find hidden processes with various process listings mac_recover_filesystem # Recover the cached filesystem mac_route # Prints the routing table mac_socket_filters # Reports socket filters mac_strings # Match physical offsets to virtual addresses (may take a while, VERY verbose) mac_tasks # List Active Tasks mac_threads # List Process Threads mac_threads_simple # Lists threads along with their start time and priority mac_timers # Reports timers set by kernel drivers mac_trustedbsd # Lists malicious trustedbsd policies mac_version # Prints the Mac version mac_vfsevents # Lists processes filtering file system events mac_volshell # Shell in the memory image mac_yarascan # Scan memory for yara signatures