MemProcFS - This Changes Everything

  Рет қаралды 18,828

13Cubed

13Cubed

Күн бұрын

Пікірлер: 33
@cexesp2022
@cexesp2022 2 жыл бұрын
This is by far the most useful tool introduced in your informative channel .. Many thanks for the support you are providing to us.
@muhammadhassoub299
@muhammadhassoub299 2 жыл бұрын
Great video as usual. I wait for a practical applied case using this tool
@chrisclark5135
@chrisclark5135 2 жыл бұрын
Great find! Thanks for sharing and I'll be using this going forward for sure!
@GlobalSecure
@GlobalSecure 2 жыл бұрын
The best project on DFIR a ever see! amazing work!!
@MultiNamer
@MultiNamer 2 жыл бұрын
Wow, Absolutely fantastic, I have dreamed of this kind of tool. So valuable, Thanks a lot.
@Bequietize
@Bequietize 2 жыл бұрын
One interesting thing which you did not show is NTFS directory in forensics, of course you have whole MFT list in one file but sometimes I don't know what am I looking for and I find it extremely helpful that you can just browse through it like C->Users->user->Downloads and you see there bunch of files and start thinking. Why are those files visible in memory? Did something loaded it up or was it downloaded with browser? Anyways, as always great content, thank you for your work :)!
@13Cubed
@13Cubed 2 жыл бұрын
About the best you can do would be to browse the contents of the $MFT as available within the memory capture. Some of those files may actually be present within memory, and recoverable. That said, there isn't a virtual directory hierarchy that re-creates the entire file system structure. Also remember that there are no guarantees in memory forensics -- what you are looking for *may* be present, or it may have been paged to disk and not available in the memory capture. Also keep in mind that at some point, everything you do on a computer system (websites you visit, pictures you view, documents you create, etc.) traverses the memory. So, there can be a lot of interesting evidence and potentially valuable content therein -- but again, just no guarantees.
@mohammedal-mudhafar4602
@mohammedal-mudhafar4602 Жыл бұрын
This is so valuable, thanks a lot :)
@fabianoaraujodecarvalho1967
@fabianoaraujodecarvalho1967 2 жыл бұрын
the best class, very good
@agu227
@agu227 2 жыл бұрын
This changes everything
@JediBuddhist
@JediBuddhist 2 жыл бұрын
Thats Great Thank you.
@shibly99
@shibly99 Жыл бұрын
This saves my day.
@HitemAriania
@HitemAriania 2 жыл бұрын
Ive been using this for awhile, superglad you covered it so well! A completely other question: Is there any good tools to create a memory dump without crashing the system? Havent found one yeat.
@13Cubed
@13Cubed 2 жыл бұрын
WinPmem is usually my go-to.
@HitemAriania
@HitemAriania 2 жыл бұрын
@@13Cubed Thank you kind sir! Keep up the superb work :)
@abhijitgupta90
@abhijitgupta90 Жыл бұрын
This is a revelation!
@johndittamo1085
@johndittamo1085 2 жыл бұрын
What Linux distros does this support?
@moradosama9076
@moradosama9076 2 жыл бұрын
Great video
@alanharper5087
@alanharper5087 Ай бұрын
I have issues with installing Dokany,, so I uninstalled it but the Windows uninstaller did not do a complete uninstall and I can't reinstall it because the Dokany installer thinks it is still installed. Ideas anyone?
@13Cubed
@13Cubed Ай бұрын
Look at the version history for Dokany and try to install a previous release instead of the newest release. See if it will let you proceed then.
@alanharper5087
@alanharper5087 Ай бұрын
@@13Cubed Thanks. I tried that but because Win10 did not fully uninstall Dokany, I cannot install any version.
@servermadum7297
@servermadum7297 7 ай бұрын
Thanks for video
@CookieBrainSlug
@CookieBrainSlug 2 жыл бұрын
Would MemProcFS be able to process Windows 10 hibernation files (hiberfil.sys)?
@13Cubed
@13Cubed 2 жыл бұрын
If you use Hibernation Recon to extract the active memory from hiberfil.sys, it should work. Check out the Windows Hibernation Files episode for more information on how to do that.
@stephencole9289
@stephencole9289 2 жыл бұрын
You can of course do most of this from a debugger on the dump, but requires a great deal of expertise (and time and effort). The forensics bit etc automates a lot of that
@tg7943
@tg7943 2 жыл бұрын
Push!
@mk72v2oq
@mk72v2oq 2 жыл бұрын
So it basically trying to recreate Linux (or any Unix-like system) in Windows.
@chriseastwood1310
@chriseastwood1310 2 жыл бұрын
first
@maheshbind5181
@maheshbind5181 2 ай бұрын
This is really amazing . You are awesome as always. I generally face challenges and not getting parsed data in forensic folder. I only have four files database.txt, forensics_enable.txt, progress_percent.txt and readme.txt. The files and folders are visible for me. Does it take time if I am investigating a 17.4 gb of ram size. How long???
@13Cubed
@13Cubed 2 ай бұрын
Check the progress_percent.txt file -- that should display the percentage complete for the forensic process. It can take 15-20 minutes or longer, depending on the speed of your system and the size of the image. It should be at 100 when complete.
@mussaabdi
@mussaabdi 2 жыл бұрын
Why is it only 1GB of storage?so if your memory is 10GB it keeps saying insufficient memory.KINDLY address will appreciate @13Cubed
LNK Files and Jump Lists
27:00
13Cubed
Рет қаралды 32 М.
A File's Life - File Deletion and Recovery
30:26
13Cubed
Рет қаралды 7 М.
БАБУШКА ШАРИТ #shorts
0:16
Паша Осадчий
Рет қаралды 4,1 МЛН
She wanted to set me up #shorts by Tsuriki Show
0:56
Tsuriki Show
Рет қаралды 8 МЛН
Switching to Linux: Drives & Partitions
17:11
ExplainingComputers
Рет қаралды 73 М.
13 DOS commands you NEVER knew you NEEDED!
21:57
Ask Your Computer Guy
Рет қаралды 120 М.
Event Log Chainsaw Massacre - Powerful Threat Detection
18:48
Detecting PsExec Usage
23:16
13Cubed
Рет қаралды 12 М.
AT&T Archives: The UNIX Operating System
27:27
AT&T Tech Channel
Рет қаралды 2 МЛН
The Dissect Effect - An Open Source IR Framework
15:47
13Cubed
Рет қаралды 8 М.
Introduction to Windows Forensics
1:04:33
13Cubed
Рет қаралды 181 М.
Explaining File Systems: NTFS, exFAT, FAT32, ext4 & More
11:05
ExplainingComputers
Рет қаралды 1,3 МЛН