Offline Memory Forensics With Volatility

Source: Black Hills Information Security, Inc. Author: BHIS URL: https://www.blackhillsinfosec.com/offline-memory-forensics-with-volatility/

ONE SENTENCE SUMMARY:

Using memory forensics with Volatility on ESXi snapshots enables stealthy credential extraction and domain escalation during engagements.

MAIN POINTS:

  1. Ben Bowman is a Security Analyst focused on research and tool development at Black Hills Information Security.
  2. Attackers often aim to escalate quickly, but memory forensics offers options when typical paths are blocked.
  3. Volatility can extract SAM hashes from a VM memory snapshot, aiding privilege escalation.
  4. ESXi access allows attackers to take VM snapshots and analyze memory offline.
  5. A cracked IPMI hash can lead to ESXi login and access to hosted virtual machines.
  6. Instead of noisy probing, attackers can extract credentials from a Windows VM snapshot.
  7. Snapshots must include memory to enable effective analysis with Volatility.
  8. Volatility3 setup involves cloning the repository and installing dependencies in a Python virtual environment.
  9. SAM hashes are extracted using the windows.hashdump.Hashdump plugin on the vmem file.
  10. Extracted hashes can be used with netexec to obtain domain account credentials via LSA dumping.

TAKEAWAYS:

  1. Memory forensics offers stealthy alternatives when traditional privilege escalation fails.
  2. Volatility is a powerful tool for extracting sensitive credentials from VM memory.
  3. ESXi environments can be exploited by leveraging VM snapshots for offline analysis.
  4. Proper snapshot configuration is critical—ensure memory is included.
  5. Defending against memory analysis is challenging, making it a valuable technique for red teamers.