Name: SecondLook |
Page Reference: 117, 124 |
Author/Distributor: Raytheon Pikewerks/SecondLook Forensics |
Available From: http://www.secondlookforensics.com |
Description: Advanced Linux memory analysis capabilities have been developed in a specialized tool called SecondLook that has a command-line and GUI version, as well as an Enterprise edition. The GUI of SecondLook is shown here with the alerts screen showing suspicious changes in memory due to malware: |
Name: Volatility |
Page Reference: 116, 119-120, 122-125 |
Author/Distributor: Volatile Systems |
Available From: https://www.volatilesystems.com/default/volatility |
Description: Volatility grew out of the FATKit project and is written in Python, with development being led by AAron Walters. Volatility was originally developed to examine Windows memory dumps and has been adapted to work with Linux memory dumps. The Linux version of Volatility can be used to extract information about processes, network connections, open handles and other system related details. # python volatility/vol.py –f Phalanx2.dd --profile=LinuxFedora14x64 linux_pslist |
Linux Plugins:
Processes:
Process Memory:
Kernel Memory and Objects:
Rootkit Detection:
Networking:
|
Name: Shortstop |
Page Reference: 138 |
Author/Distributor: Joerg Kost |
Available From: http://code.google.com/p/shortstop/ |
Description: The shortstop utility captures process memory and assorted information about the system, including the command line, current working directory, status, environment variables, listings of associated entries in the “/proc” system, and memory map. The command line is shown below and the file output can be redirected to a file. # shortstop –m –p <PID> |
Name: Memfetch |
Page Reference: 138 |
Author/Distributor: Michal Zalewski |
Available From: http://lcamtuf.coredump.cx/soft/memfetch.tgz |
Description: The memfetch utility dumps the memory mappings of a process into separate files for further analysis. |
Name: Process Dumper |
Page Reference: 138 |
Author/Distributor: Tobias Klein |
Available From: http://www.trapkit.de/research/forensic/pd/index.html |
Description: Process Dumper is used in combination with Memory Parser to dump and analyze process memory. The process dumper tool has a simple usage with output directed to standard out (preferable to redirect the output to a file): # pd –p <PID> |
Name: gcore |
Page Reference: 138 |
Author/Distributor: Eric Cooper |
Available From: Native to Linux distributions |
Description: gcore is a command-line utility that generates a core file for a target process (specified by its PID). By default, the resulting core file is written to core, <pid>, in the current directory. Alternatively, using the –o switch the digital investigation can direct the output of gcore to a specified file and location, as demonstrated in the following command: # gcore –o outputfile <PID> |
Name: pcat |
Page Reference: 138 |
Author/Distributor: Dan Farmer and Wietse Venema |
Available From: http://www.porcupine.org/forensics/tct.html |
Description: The pcat utility is a component of The Coroners Toolkit that captures process memory. It can also generate a map file of the process memory using the –m switch. # pcat –m –p <PID> outputfile |