Pulling Threads

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 พ.ย. 2024

ความคิดเห็น • 17

  • @jajinkya143
    @jajinkya143 3 ปีที่แล้ว +1

    Hey!! Always love your videos. I noticed in the older version of your volatility folder you ran "vol.py -h | grep mal" and you found the mal plugins, but the new volatility folder you ran "python vol.py -h | grep -i mal" and you do not see the plugins.
    Although when I run "vol.py" I see all the mal plugins and when I run "python vol.py" I see only malfind (after cloning from git).
    What does this mean? why is there a difference when we execute it with python?
    Sorry If you find my comment confusing!! But would love to know the reason.
    Thank you!!! Again love your videos...

  • @yeti_sec997
    @yeti_sec997 4 ปีที่แล้ว +2

    What memory acquisition tool did you use for your test ? I haven't had great results with winpmem. Using Comae DumpIt, FTK RAM Imager, VMware vmem has had better results with no smear, offset alignments etc.

    • @13Cubed
      @13Cubed  4 ปีที่แล้ว

      DumpIt or Magnet RAM Capture would be my go-tos.

    • @yeti_sec997
      @yeti_sec997 4 ปีที่แล้ว

      @@13Cubed Thanks appreciate you sharing

  • @algoquemole
    @algoquemole 5 ปีที่แล้ว +1

    Saw the video-challenge too late :( Do more of this!

  • @anthonyc7407
    @anthonyc7407 5 ปีที่แล้ว +1

    Great video as always! Thank you

  • @mahmoudramadan4566
    @mahmoudramadan4566 4 ปีที่แล้ว +1

    really thank you for this video .. i have a question why those hashes for three processes didn't detected on virustoltal

    • @13Cubed
      @13Cubed  4 ปีที่แล้ว +1

      They are not malicious, just test "malware" for learning purposes.

    • @mahmoudramadan4566
      @mahmoudramadan4566 4 ปีที่แล้ว +1

      ch @@13Cubed thank you so much for all this information

  • @emran5897
    @emran5897 5 ปีที่แล้ว +1

    Hi.....
    A perfect video from a perfect person.
    The mem file is very huge to download(5GB) but anyway thanks for the Video and mem sample.
    Again
    THANKS FOR THE VIDEO..........

  • @ravan01d
    @ravan01d 5 ปีที่แล้ว +1

    Thanks for the awesome videos.

  • @stephenkimiru2269
    @stephenkimiru2269 5 ปีที่แล้ว

    nice video!! I know its too late but i have a question on the challenge? i tried cracking the hash value for the password but i found no matches. Here is the hash value for the 13 cubed user i extracted from the memory. (9fd84669988d0ec5e1662d47c06a35c6) Please confirm if it is the right hash value? Thanks in advance.

    • @13Cubed
      @13Cubed  5 ปีที่แล้ว

      That's the hash extracted from memory, but there is an easier way. Try using the "lsadump" Volatility plugin. ;)

    • @stephenkimiru2269
      @stephenkimiru2269 5 ปีที่แล้ว +2

      @@13Cubed thanks alot. "lsadump" plugin worked and i got to view the default password. For sure its the easiest way.

  • @joshuampere4327
    @joshuampere4327 5 ปีที่แล้ว +1

    can you unpack packed malware in a video

    • @13Cubed
      @13Cubed  5 ปีที่แล้ว

      Check out "Some Assembly Required", the first episode of the Introduction to Malware Analysis series. th-cam.com/video/-Ml04jPMH3U/w-d-xo.html

  • @hseas3793
    @hseas3793 ปีที่แล้ว

    4 years later-markinho..*7¡Vamos!
    format nt with rocktou.txt using john?