Source: Black Hills Information Security, Inc. Author: BHIS URL: https://www.blackhillsinfosec.com/offline-memory-forensics-with-volatility/
-
ONE SENTENCE SUMMARY: Using memory forensics with Volatility on ESXi snapshots enables stealthy credential extraction and domain escalation during engagements.
-
MAIN POINTS:
-
Ben Bowman is a Security Analyst focused on research and tool development at Black Hills Information Security.
-
Attackers often aim to escalate quickly, but memory forensics offers options when typical paths are blocked.
-
Volatility can extract SAM hashes from a VM memory snapshot, aiding privilege escalation.
-
ESXi access allows attackers to take VM snapshots and analyze memory offline.
-
A cracked IPMI hash can lead to ESXi login and access to hosted virtual machines.
-
Instead of noisy probing, attackers can extract credentials from a Windows VM snapshot.
-
Snapshots must include memory to enable effective analysis with Volatility.
-
Volatility3 setup involves cloning the repository and installing dependencies in a Python virtual environment.
-
SAM hashes are extracted using the windows.hashdump.Hashdump plugin on the vmem file.
-
Extracted hashes can be used with netexec to obtain domain account credentials via LSA dumping.
-
TAKEAWAYS:
-
Memory forensics offers stealthy alternatives when traditional privilege escalation fails.
-
Volatility is a powerful tool for extracting sensitive credentials from VM memory.
-
ESXi environments can be exploited by leveraging VM snapshots for offline analysis.
-
Proper snapshot configuration is critical—ensure memory is included.
-
Defending against memory analysis is challenging, making it a valuable technique for red teamers.