磁盘取证 CISCN半决赛 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 sudo mkdir -p /mnt/er/imgfdisk -l cha.raw sudo mount -o ro,loop,offset=1048576 cha.raw /mnt/er/img"" " mount: /mnt/er/img: 无法以只读方式挂载 /dev/loop0p1. dmesg(1) may have more information after failed mount system call. " "" sudo losetup -Pf --show -r cha.rawlsblk -f /dev/loop0 sudo mount -o ro /dev/loop0p1 /mnt/er/img"" " mount: /mnt/er/img: 无法以只读方式挂载 /dev/loop0p1. dmesg(1) may have more information after failed mount system call. " "" sudo mount -t ext4 -o ro,noload /dev/loop0p1 /mnt/er/imgsudo umount /mnt/er/imgsudo losetup -d /dev/loop0lsblk /dev/loop0 2>/dev/null; or echo "loop0 released" fls -rdp /dev/loop0p1 sudo debugfs -R "lsdel" /dev/loop0p1
屈服了,还是R-Studio好用
内存取证
[!Note] Volatility 官方在 2025-05-16 宣布 Volatility 3 已达到对 Volatility 2 的“官方功能对等(parity)”,并明确说明 Volatility 2 已弃用(deprecated),其 GitHub 仓库也已归档。官方同时表示 Volatility 3 会继续长期活跃维护
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 vol -f Challenge.raw windows.info/linux.info vol -f xxx.raw windows.pslist vol -f xxx.raw windows.psscan vol -f xxx.raw windows.pstree vol -f xxx.raw windows.pslist --pid 1076 vol.exe -o ./outputdir/ -f xxx.raw windows.pslist --pid 1234 --dump vol.exe -o ./outputdir/ -f xxx.raw windows.memmap --pid 1234 --dump vol.exe -f xxx.raw windows.handles vol.exe -f xxx.raw windows.handles --pid 1234 vol.exe -f xxx.raw windows.dlllist vol.exe -f xxx.raw windows.dlllist --pid 1234 vol.exe -o ./outputdir/ -f xxx.raw windows.dlllist --pid 1234 --dump vol.exe -f xxx.raw windows.cmdline vol.exe -f xxx.raw windows.cmdline --pid 1234 vol.exe -f xxx.raw windows.netscan vol.exe -f xxx.raw windows.netscan --include-corrupt vol.exe -f xxx.raw windows.registry.hivescan vol.exe -f xxx.raw windows.registry.hivelist vol -f Challenge.raw -o ./tmp windows.registry.hivelist --filter "TroubleMaker\ntuser.dat" --dump vol.exe -f xxx.raw windows.registry.printkey vol.exe -f xxx.raw windows.registry.printkey --offset OFFSET vol.exe -f xxx.raw windows.registry.printkey --key KEY vol.exe -f xxx.raw windows.filescan | Select-String "flag" vol.exe -o ./outputdir/ -f xxx.raw windows.dumpfiles --pid 1234 vol.exe -o ./outputdir/ -f xxx.raw windows.dumpfiles --virtaddr 0xee1122 vol.exe -o ./outputdir/ -f xxx.raw windows.dumpfiles --physaddr 0xee1122 vol.exe -f xxx.raw windows.malfind vol.exe -f xxx.raw windows.malfind --pid 1234 vol.exe -o ./outputdir/ -f xxx.raw windows.malfind --pid 1234 --dump
[!Note] 有时候暴力搜字符是可能有用的
1 2 windows.strings.Strings Reads output from the strings command and indicates which process(es) each string belongs to.
有时候还是vol2好用,比如clipboard这些vol3还没实现
1 python2 vol.py -f ~/Downloads/Challenge.raw --profile=Win7SP1x64 clipboard
然后cmdscan也是,vol3不支持一些老旧的题目
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 python2 vol.py -f ~/Downloads/Challenge.raw --profile=Win7SP1x64 cmdscan python2 vol.py -f ~/Downloads/Challenge.raw --profile=Win7SP1x64 iehistory python2 vol.py -f Challenge.raw --profile=Win7SP1x64 procdump -p 2728 -D ./ python2 vol.py -f Challenge.raw --profile=Win7SP1x64 dumpfiles -Q 0x000000011fd0ca70 -D ./ python2 vol.py -f Challenge.raw --profile=Win7SP1x64 mimikatz
下载ftk imager
https://go.exterro.com/l/43312/2022-08-23/f7rytx