Source: Black Hills Information Security, Inc. Author: BHIS URL: https://www.blackhillsinfosec.com/offline-memory-forensics-with-volatility/
ONE SENTENCE SUMMARY:
Using memory forensics with Volatility on ESXi snapshots enables stealthy credential extraction and domain escalation during engagements.
MAIN POINTS:
- Ben Bowman is a Security Analyst focused on research and tool development at Black Hills Information Security.
- Attackers often aim to escalate quickly, but memory forensics offers options when typical paths are blocked.
- Volatility can extract SAM hashes from a VM memory snapshot, aiding privilege escalation.
- ESXi access allows attackers to take VM snapshots and analyze memory offline.
- A cracked IPMI hash can lead to ESXi login and access to hosted virtual machines.
- Instead of noisy probing, attackers can extract credentials from a Windows VM snapshot.
- Snapshots must include memory to enable effective analysis with Volatility.
- Volatility3 setup involves cloning the repository and installing dependencies in a Python virtual environment.
- SAM hashes are extracted using the windows.hashdump.Hashdump plugin on the vmem file.
- Extracted hashes can be used with netexec to obtain domain account credentials via LSA dumping.
TAKEAWAYS:
- Memory forensics offers stealthy alternatives when traditional privilege escalation fails.
- Volatility is a powerful tool for extracting sensitive credentials from VM memory.
- ESXi environments can be exploited by leveraging VM snapshots for offline analysis.
- Proper snapshot configuration is critical—ensure memory is included.
- Defending against memory analysis is challenging, making it a valuable technique for red teamers.