
This should not be a surprise to people who use forensic tools on a daily basis, but it is a good reminder. I just noticed two great posts,
Dumping Memory to extract Password Hashes Part 1 and
Dumping Memory to extract Password Hashes Part 2, on the
Attack Research blog. They show how to exploit a system with Metasploit, upload the Meterpreter, upload
Mantech's MDD memory dumper, dump memory, download it to an attacker's system, and then follow instructions from
Forensiczone to use
Moyix's volreg extensions to the
Volatility Framework to extract passwords.
I would be curious to see if intruders are really using methodologies like this. One way to identify such activity would be to watch for files being exfiltrated from the enterprise that match common memory sizes, such as 512 MB, 1 GB, 2 GB, 4 GB, and so on.
Richard Bejtlich is teaching new classes in
Europe and
Las Vegas in 2009.
Online Europe registration ends by 1 Apr, and seats are filling.
"Super Early" Las Vegas registration ends 15 Mar.
Tidak ada komentar:
Posting Komentar