SlideShare una empresa de Scribd logo
1 de 57
2014-
2014
4
5
6
2014
8
9
10
11
12
13
14
15
2014
17 
<Source : Volatility Google code>
18 
Windows x86 
Windows x64 
Linux 
Mac OSX 
Windows XP 
Service Pack 2 and 3 
Windows XP 
Service Pack 1 and 2 
32-bit Linux kernels 
2.6.11 to 3.5 
32-bit 10.5.x Leopard 
Windows 2003 Server 
Service Pack 0, 1, 2 
Windows 2003 Server 
Service Pack 1 and 2 
64-bit Linux kernels 
2.6.11 to 3.5 
32-bit 10.6.x Snow Leopard 
Windows Vista 
Service Pack 0, 1, 2 
Windows Vista 
Service Pack 0, 1, 2 
OpenSuSE,CentOS 
64-bit 10.6.x Snow Leopard 
Windows 2008 Server 
Service Pack 1, 2 
Windows 2008 Server 
Service Pack 1 and 2 
Ubuntu, Debian 
32-bit 10.7.x Lion 
Windows 7 Service 
Pack 0, 1 
Windows 2008 R2 Server 
Service Pack 0 and 1 
Fedora, Mandriva 
64-bit 10.7.x Lion 
Windows 7 
Service Pack 0 and 1 
64-bit 10.8.x Mountain Lion
19
20
21
22
23 
NOTE : Ubuntu Kernel에서는다음을추가실행이필요 
# echo “/usr/local/lib” >> /etc/ld.so.conf 
# ldconfig
24 
운영체제 
분석 
Process 분석 
Network 분석 
DLL 및Thread 분석 
String 분석 
Registry 분석
25
26
27
2014
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45 
Disassembled Code
46
47
48
49
50
51
2014
53
2014
55
56
57

Más contenido relacionado

La actualidad más candente

Os installation
Os installationOs installation
Os installation
gotgoat
 
Installing Microsoft Server 2003
Installing Microsoft Server 2003Installing Microsoft Server 2003
Installing Microsoft Server 2003
alxconn
 
Recover linux after windows installation
Recover linux after windows installationRecover linux after windows installation
Recover linux after windows installation
Amrinder Singh
 

La actualidad más candente (20)

MidwestJS: Building Real-time Chess with Socket.io
MidwestJS: Building Real-time Chess with Socket.ioMidwestJS: Building Real-time Chess with Socket.io
MidwestJS: Building Real-time Chess with Socket.io
 
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virshCreación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
 
Virtual boxen
Virtual boxenVirtual boxen
Virtual boxen
 
Versiones de sistemas operativos
Versiones de sistemas operativosVersiones de sistemas operativos
Versiones de sistemas operativos
 
Industrial Server System for Performance Demanding Applications
Industrial Server System for Performance Demanding ApplicationsIndustrial Server System for Performance Demanding Applications
Industrial Server System for Performance Demanding Applications
 
How to ride a 100GbE LAN -MEMO-
How to ride a 100GbE LAN -MEMO-How to ride a 100GbE LAN -MEMO-
How to ride a 100GbE LAN -MEMO-
 
Os installation
Os installationOs installation
Os installation
 
Installing vm ware esxi 6.0 on supermicro server
Installing vm ware esxi 6.0 on supermicro serverInstalling vm ware esxi 6.0 on supermicro server
Installing vm ware esxi 6.0 on supermicro server
 
Hacking with ARM devices on Linux
Hacking with ARM devices on Linux Hacking with ARM devices on Linux
Hacking with ARM devices on Linux
 
Local incident response
Local incident responseLocal incident response
Local incident response
 
Installing Microsoft Server 2003
Installing Microsoft Server 2003Installing Microsoft Server 2003
Installing Microsoft Server 2003
 
How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan) How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan)
 
Recover linux after windows installation
Recover linux after windows installationRecover linux after windows installation
Recover linux after windows installation
 
Change log
Change logChange log
Change log
 
Ubuntu 9.10 Party Tainan - small talk
Ubuntu 9.10 Party Tainan - small talkUbuntu 9.10 Party Tainan - small talk
Ubuntu 9.10 Party Tainan - small talk
 
Unix for developers
Unix for developersUnix for developers
Unix for developers
 
How to install OpenStack MITAKA --allinone - cheat sheet -
How to install OpenStack MITAKA --allinone - cheat sheet -How to install OpenStack MITAKA --allinone - cheat sheet -
How to install OpenStack MITAKA --allinone - cheat sheet -
 
MQTTS mosquitto - cheat sheet -
MQTTS mosquitto - cheat sheet -MQTTS mosquitto - cheat sheet -
MQTTS mosquitto - cheat sheet -
 
RabbitMQ Server - cheat sheet -
RabbitMQ Server - cheat sheet -RabbitMQ Server - cheat sheet -
RabbitMQ Server - cheat sheet -
 
Booting directly opensuse iso file by grub2 @ openSUSE Asia Summit2015
Booting directly opensuse iso file by grub2 @ openSUSE Asia Summit2015Booting directly opensuse iso file by grub2 @ openSUSE Asia Summit2015
Booting directly opensuse iso file by grub2 @ openSUSE Asia Summit2015
 

Destacado

Destacado (10)

Apt(advanced persistent threat) 공격의 현재와 대응 방안
Apt(advanced persistent threat) 공격의 현재와 대응 방안Apt(advanced persistent threat) 공격의 현재와 대응 방안
Apt(advanced persistent threat) 공격의 현재와 대응 방안
 
Memory forensics with volatility
Memory forensics with volatilityMemory forensics with volatility
Memory forensics with volatility
 
SNS 보안 위협 사례
SNS 보안 위협 사례SNS 보안 위협 사례
SNS 보안 위협 사례
 
보안 위협 동향과 대응 방안
보안 위협 동향과 대응 방안보안 위협 동향과 대응 방안
보안 위협 동향과 대응 방안
 
APT Case Study
APT Case StudyAPT Case Study
APT Case Study
 
보안 위협과 악성코드 분석 기법
보안 위협과 악성코드 분석 기법보안 위협과 악성코드 분석 기법
보안 위협과 악성코드 분석 기법
 
클라우드 서비스를 이용한 APT 대응
클라우드 서비스를 이용한 APT 대응클라우드 서비스를 이용한 APT 대응
클라우드 서비스를 이용한 APT 대응
 
보안 위협 동향과 대응 방안
보안 위협 동향과 대응 방안보안 위협 동향과 대응 방안
보안 위협 동향과 대응 방안
 
보안 위협과 악성코드 분석 기법
보안 위협과 악성코드 분석 기법보안 위협과 악성코드 분석 기법
보안 위협과 악성코드 분석 기법
 
2010년 상반기 보안 위협 동향과 주요 보안 위협
2010년 상반기 보안 위협 동향과 주요 보안 위협2010년 상반기 보안 위협 동향과 주요 보안 위협
2010년 상반기 보안 위협 동향과 주요 보안 위협
 

Similar a Volatility를 이용한 memory forensics

วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
lifestyle41
 
วิวัฒนาการของ Microsoft windows
วิวัฒนาการของ Microsoft windowsวิวัฒนาการของ Microsoft windows
วิวัฒนาการของ Microsoft windows
lifestyle41
 
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
lifestyle41
 
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
lifestyle41
 
Share point 2010_overview -systemreq
Share point 2010_overview -systemreqShare point 2010_overview -systemreq
Share point 2010_overview -systemreq
Narayana Reddy
 

Similar a Volatility를 이용한 memory forensics (20)

Undead Attack
Undead AttackUndead Attack
Undead Attack
 
Linux and SUSE
Linux and SUSELinux and SUSE
Linux and SUSE
 
V space
V space V space
V space
 
Fusioninventory rmll-2011
Fusioninventory rmll-2011Fusioninventory rmll-2011
Fusioninventory rmll-2011
 
Agent sss 33_en
Agent sss 33_enAgent sss 33_en
Agent sss 33_en
 
Tip from IBM Connect 2014: IBM Domino 64-bit: All you need to know
Tip from IBM Connect 2014: IBM Domino 64-bit: All you need to knowTip from IBM Connect 2014: IBM Domino 64-bit: All you need to know
Tip from IBM Connect 2014: IBM Domino 64-bit: All you need to know
 
Building Blocks of the Private Cloud - Compute
Building Blocks of the Private Cloud - ComputeBuilding Blocks of the Private Cloud - Compute
Building Blocks of the Private Cloud - Compute
 
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
 
วิวัฒนาการของ Microsoft windows
วิวัฒนาการของ Microsoft windowsวิวัฒนาการของ Microsoft windows
วิวัฒนาการของ Microsoft windows
 
Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330
 
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
 
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
 
64bit_Linux-Myths_and_Facts_for AMD_Processors.pdf
64bit_Linux-Myths_and_Facts_for AMD_Processors.pdf64bit_Linux-Myths_and_Facts_for AMD_Processors.pdf
64bit_Linux-Myths_and_Facts_for AMD_Processors.pdf
 
Operating system
Operating systemOperating system
Operating system
 
Share point 2010_overview -systemreq
Share point 2010_overview -systemreqShare point 2010_overview -systemreq
Share point 2010_overview -systemreq
 
GATES WINDOWS
GATES WINDOWSGATES WINDOWS
GATES WINDOWS
 
Fusioninventory openworldforum-paris-2011-september
Fusioninventory openworldforum-paris-2011-septemberFusioninventory openworldforum-paris-2011-september
Fusioninventory openworldforum-paris-2011-september
 
Kernel Recipes 2014 - The Linux Kernel, how fast it is developed and how we s...
Kernel Recipes 2014 - The Linux Kernel, how fast it is developed and how we s...Kernel Recipes 2014 - The Linux Kernel, how fast it is developed and how we s...
Kernel Recipes 2014 - The Linux Kernel, how fast it is developed and how we s...
 
Linux on Hyper-V
Linux on Hyper-VLinux on Hyper-V
Linux on Hyper-V
 
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
 

Más de Youngjun Chang

Más de Youngjun Chang (20)

IT보안과 사회공학(Social Engineering)
IT보안과 사회공학(Social Engineering)IT보안과 사회공학(Social Engineering)
IT보안과 사회공학(Social Engineering)
 
2011년 보안 이슈와 2012년 보안 위협 예측
2011년 보안 이슈와 2012년 보안 위협 예측2011년 보안 이슈와 2012년 보안 위협 예측
2011년 보안 이슈와 2012년 보안 위협 예측
 
보안 위협 형태와 악성코드 분석 기법
보안 위협 형태와 악성코드 분석 기법보안 위협 형태와 악성코드 분석 기법
보안 위협 형태와 악성코드 분석 기법
 
보안 위협과 악성코드 분석 기법
보안 위협과 악성코드 분석 기법보안 위협과 악성코드 분석 기법
보안 위협과 악성코드 분석 기법
 
2. 악성코드 동적 분석 방법론
2. 악성코드 동적 분석 방법론2. 악성코드 동적 분석 방법론
2. 악성코드 동적 분석 방법론
 
1. 보안 위협 동향과 주요 보안 위협 특징
1. 보안 위협 동향과 주요 보안 위협 특징1. 보안 위협 동향과 주요 보안 위협 특징
1. 보안 위협 동향과 주요 보안 위협 특징
 
5. system level reversing
5. system level reversing5. system level reversing
5. system level reversing
 
4. reverse engineering basic
4. reverse engineering basic4. reverse engineering basic
4. reverse engineering basic
 
3. windows system과 rootkit
3. windows system과 rootkit3. windows system과 rootkit
3. windows system과 rootkit
 
2. windows system과 file format
2. windows system과 file format2. windows system과 file format
2. windows system과 file format
 
1. 2009년 상반기 보안 위협 동향
1. 2009년 상반기 보안 위협 동향1. 2009년 상반기 보안 위협 동향
1. 2009년 상반기 보안 위협 동향
 
6. code level reversing
6. code level reversing6. code level reversing
6. code level reversing
 
악성코드와 개인 정보 보호
악성코드와 개인 정보 보호악성코드와 개인 정보 보호
악성코드와 개인 정보 보호
 
중국 보안 위협 동향
중국 보안 위협 동향중국 보안 위협 동향
중국 보안 위협 동향
 
3. 악성코드 분석 사례
3. 악성코드 분석 사례3. 악성코드 분석 사례
3. 악성코드 분석 사례
 
2. 악성코드 분석 방법론과 기법
2. 악성코드 분석 방법론과 기법2. 악성코드 분석 방법론과 기법
2. 악성코드 분석 방법론과 기법
 
1. 악성코드 진단 기법 개론
1. 악성코드 진단 기법 개론1. 악성코드 진단 기법 개론
1. 악성코드 진단 기법 개론
 
악성코드와 개인 정보 보호
악성코드와 개인 정보 보호악성코드와 개인 정보 보호
악성코드와 개인 정보 보호
 
보안 위협 동향과 대응 방안
보안 위협 동향과 대응 방안보안 위협 동향과 대응 방안
보안 위협 동향과 대응 방안
 
악성 코드와 보안 위협 동향
악성 코드와 보안 위협 동향악성 코드와 보안 위협 동향
악성 코드와 보안 위협 동향
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Volatility를 이용한 memory forensics

  • 1.
  • 4. 4
  • 5. 5
  • 6. 6
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 2014
  • 17. 17 <Source : Volatility Google code>
  • 18. 18 Windows x86 Windows x64 Linux Mac OSX Windows XP Service Pack 2 and 3 Windows XP Service Pack 1 and 2 32-bit Linux kernels 2.6.11 to 3.5 32-bit 10.5.x Leopard Windows 2003 Server Service Pack 0, 1, 2 Windows 2003 Server Service Pack 1 and 2 64-bit Linux kernels 2.6.11 to 3.5 32-bit 10.6.x Snow Leopard Windows Vista Service Pack 0, 1, 2 Windows Vista Service Pack 0, 1, 2 OpenSuSE,CentOS 64-bit 10.6.x Snow Leopard Windows 2008 Server Service Pack 1, 2 Windows 2008 Server Service Pack 1 and 2 Ubuntu, Debian 32-bit 10.7.x Lion Windows 7 Service Pack 0, 1 Windows 2008 R2 Server Service Pack 0 and 1 Fedora, Mandriva 64-bit 10.7.x Lion Windows 7 Service Pack 0 and 1 64-bit 10.8.x Mountain Lion
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23 NOTE : Ubuntu Kernel에서는다음을추가실행이필요 # echo “/usr/local/lib” >> /etc/ld.so.conf # ldconfig
  • 24. 24 운영체제 분석 Process 분석 Network 분석 DLL 및Thread 분석 String 분석 Registry 분석
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 2014
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36
  • 37. 37
  • 38. 38
  • 39. 39
  • 40. 40
  • 41. 41
  • 42. 42
  • 43. 43
  • 44. 44
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. 50
  • 51. 51
  • 52. 2014
  • 53. 53
  • 54. 2014
  • 55. 55
  • 56. 56
  • 57. 57