ย
ย
ย
ย
1. ์ฌ์ ์ค๋น
- Python ์ค์น
- Volatility ์ค์
- https://github.com/volatilityfoundation/volatility3/releases
- requirements.txt ์ค์น
- ๋ฉ๋ชจ๋ฆฌ ๋ค์ด๋ก๋ (๋น๋ฐ๋ฒํธ
infected
)
- pestudio ๋ค์ด๋ก๋ (3๋ฒ ๋ฌธ์ )
ย
ย
2. ๋ฌธ์
Q1. What was the date and time when Memory from the compromised endpoint was acquired?
- ๋ค์์ ๋ช ๋ น์ด๋ก ์ ๋ณด ํ์ธ
python vol.py -f ${MEMORY_PATH} windows.info

์ ๋ต
2022-07-26 18:16:32
ย
Q2. What was the suspicious process running on the system? (Format : name.extension)
- ๋ค์์ ๋ช ๋ น์ด๋ก ํ๋ก์ธ์ค ์ ๋ณด ํ์ธ
python vol.py -f ${MEMORY_PATH} windows.pslist python vol.py -f ${MEMORY_PATH} windows.psscan python vol.py -f ${MEMORY_PATH} windows.pstree

- ๋ค์์ ๋ช ๋ น์ด๋ก ๋ช ๋ น์ด ์ ๋ณด ํ์ธ
python vol.py -f ${MEMORY_PATH} windows.cmdline

- ์ฐธ๊ณ
- ํ๋ก์ธ์ค ๋ชฉ๋ก์ ์ดํด๋ณด๋ฉด lsass.exe๊ฐ ๋๋ฒ ํฌ์ฐฉ๋๋๋ฐ lsass.exe ๊ฐ์๋ 1๊ฐ์ฌ์ผ ํ๋ฉฐ, ๊ฒฝ๋ก๋ C:\Windows\System32\lsass.exe์ด๋ค
์ ๋ต
lsass.exe
ย
Q3. What was the suspicious process running on the system? (Format : name.extension)
- ์๋์ ๋ช ๋ น์ด๋ก dmp ํ์ผ ์์ฑ
python vol.py -f ${MEMORY_PATH} windows.pslist --pid 7592 --dump python vol.py -f ${MEMORY_PATH} windows.dumpfiles --pid 7592 # capstone ์ค์น ํ์


- pestudio๋ก ๋คํ ํ์ผ ํ์ธ

์ ๋ต
winPEAS.exe
ย
Q4. Which User Account was compromised? Format (DomainName/USERNAME)
- ์๋์ ๋ช ๋ น์ด๋ก session ํ์ธ
python vol.py -f ${MEMORY_PATH} windows.sessions



์ ๋ต
MSEDGEWIN10/CyberJunkie
ย
Q5. What is the compromised user password?
- ์๋์ ๋ช ๋ น์ด๋ก NTLM ํด์ฌ๊ฐ ํ์ธ
python vol.py -f ${MEMORY_PATH} windows.hashdump # pycryptodome ์ค์น ํ์

- NTLM ๋ณตํธํ
์ ๋ต
password123
ย
ย
ย
ย