SlideShare a Scribd company logo
Volatility를 이용한 memory forensics
2014-
2014
4
5
6
2014
8
9
10
11
12
13
14
15
2014
17 
<Source : Volatility Google code>
18 
Windows x86 
Windows x64 
Linux 
Mac OSX 
Windows XP 
Service Pack 2 and 3 
Windows XP 
Service Pack 1 and 2 
32-bit Linux kernels 
2.6.11 to 3.5 
32-bit 10.5.x Leopard 
Windows 2003 Server 
Service Pack 0, 1, 2 
Windows 2003 Server 
Service Pack 1 and 2 
64-bit Linux kernels 
2.6.11 to 3.5 
32-bit 10.6.x Snow Leopard 
Windows Vista 
Service Pack 0, 1, 2 
Windows Vista 
Service Pack 0, 1, 2 
OpenSuSE,CentOS 
64-bit 10.6.x Snow Leopard 
Windows 2008 Server 
Service Pack 1, 2 
Windows 2008 Server 
Service Pack 1 and 2 
Ubuntu, Debian 
32-bit 10.7.x Lion 
Windows 7 Service 
Pack 0, 1 
Windows 2008 R2 Server 
Service Pack 0 and 1 
Fedora, Mandriva 
64-bit 10.7.x Lion 
Windows 7 
Service Pack 0 and 1 
64-bit 10.8.x Mountain Lion
19
20
21
22
23 
NOTE : Ubuntu Kernel에서는다음을추가실행이필요 
# echo “/usr/local/lib” >> /etc/ld.so.conf 
# ldconfig
24 
운영체제 
분석 
Process 분석 
Network 분석 
DLL 및Thread 분석 
String 분석 
Registry 분석
25
26
27
2014
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45 
Disassembled Code
46
47
48
49
50
51
2014
53
2014
55
56
57

More Related Content

ODP
openSUSE12.2 Review
PDF
初めての仮想化
PDF
Xavier NXのカーネルとVMの話
PDF
懷舊半殘的Win98體驗
PDF
Open-E DSS V6 MPIO with ESXi 4.x
PDF
OLSR setup
TXT
Instructions
PPT
Rancher OS - A simplified Linux distribution built from containers, for conta...
openSUSE12.2 Review
初めての仮想化
Xavier NXのカーネルとVMの話
懷舊半殘的Win98體驗
Open-E DSS V6 MPIO with ESXi 4.x
OLSR setup
Instructions
Rancher OS - A simplified Linux distribution built from containers, for conta...

What's hot (20)

PPTX
MidwestJS: Building Real-time Chess with Socket.io
PDF
Creación de máquinas virtuales basada en kernel usando qemu y virsh
DOC
Virtual boxen
PPTX
Versiones de sistemas operativos
PDF
Industrial Server System for Performance Demanding Applications
PDF
How to ride a 100GbE LAN -MEMO-
DOC
Os installation
PDF
Installing vm ware esxi 6.0 on supermicro server
PDF
Hacking with ARM devices on Linux
PDF
Local incident response
PPT
Installing Microsoft Server 2003
PDF
How to twist a IPv6 over Bluetooth (6lowpan)
DOC
Recover linux after windows installation
TXT
Change log
PDF
Ubuntu 9.10 Party Tainan - small talk
PDF
Unix for developers
PDF
How to install OpenStack MITAKA --allinone - cheat sheet -
PDF
MQTTS mosquitto - cheat sheet -
PDF
RabbitMQ Server - cheat sheet -
PDF
Booting directly opensuse iso file by grub2 @ openSUSE Asia Summit2015
MidwestJS: Building Real-time Chess with Socket.io
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Virtual boxen
Versiones de sistemas operativos
Industrial Server System for Performance Demanding Applications
How to ride a 100GbE LAN -MEMO-
Os installation
Installing vm ware esxi 6.0 on supermicro server
Hacking with ARM devices on Linux
Local incident response
Installing Microsoft Server 2003
How to twist a IPv6 over Bluetooth (6lowpan)
Recover linux after windows installation
Change log
Ubuntu 9.10 Party Tainan - small talk
Unix for developers
How to install OpenStack MITAKA --allinone - cheat sheet -
MQTTS mosquitto - cheat sheet -
RabbitMQ Server - cheat sheet -
Booting directly opensuse iso file by grub2 @ openSUSE Asia Summit2015
Ad

Viewers also liked (10)

PDF
Apt(advanced persistent threat) 공격의 현재와 대응 방안
PDF
Memory forensics with volatility
PDF
SNS 보안 위협 사례
PDF
보안 위협 동향과 대응 방안
PDF
APT Case Study
PDF
보안 위협과 악성코드 분석 기법
PDF
클라우드 서비스를 이용한 APT 대응
PDF
보안 위협 동향과 대응 방안
PDF
보안 위협과 악성코드 분석 기법
PDF
2010년 상반기 보안 위협 동향과 주요 보안 위협
Apt(advanced persistent threat) 공격의 현재와 대응 방안
Memory forensics with volatility
SNS 보안 위협 사례
보안 위협 동향과 대응 방안
APT Case Study
보안 위협과 악성코드 분석 기법
클라우드 서비스를 이용한 APT 대응
보안 위협 동향과 대응 방안
보안 위협과 악성코드 분석 기법
2010년 상반기 보안 위협 동향과 주요 보안 위협
Ad

More from Youngjun Chang (20)

PDF
IT보안과 사회공학(Social Engineering)
PDF
2011년 보안 이슈와 2012년 보안 위협 예측
PDF
보안 위협 형태와 악성코드 분석 기법
PDF
보안 위협과 악성코드 분석 기법
PDF
2. 악성코드 동적 분석 방법론
PDF
1. 보안 위협 동향과 주요 보안 위협 특징
PDF
5. system level reversing
PDF
4. reverse engineering basic
PDF
3. windows system과 rootkit
PDF
2. windows system과 file format
PDF
1. 2009년 상반기 보안 위협 동향
PDF
6. code level reversing
PDF
악성코드와 개인 정보 보호
PDF
중국 보안 위협 동향
PDF
3. 악성코드 분석 사례
PDF
2. 악성코드 분석 방법론과 기법
PDF
1. 악성코드 진단 기법 개론
PDF
악성코드와 개인 정보 보호
PDF
보안 위협 동향과 대응 방안
PDF
악성 코드와 보안 위협 동향
IT보안과 사회공학(Social Engineering)
2011년 보안 이슈와 2012년 보안 위협 예측
보안 위협 형태와 악성코드 분석 기법
보안 위협과 악성코드 분석 기법
2. 악성코드 동적 분석 방법론
1. 보안 위협 동향과 주요 보안 위협 특징
5. system level reversing
4. reverse engineering basic
3. windows system과 rootkit
2. windows system과 file format
1. 2009년 상반기 보안 위협 동향
6. code level reversing
악성코드와 개인 정보 보호
중국 보안 위협 동향
3. 악성코드 분석 사례
2. 악성코드 분석 방법론과 기법
1. 악성코드 진단 기법 개론
악성코드와 개인 정보 보호
보안 위협 동향과 대응 방안
악성 코드와 보안 위협 동향

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Spectral efficient network and resource selection model in 5G networks
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
sap open course for s4hana steps from ECC to s4
Mobile App Security Testing_ A Comprehensive Guide.pdf
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
MIND Revenue Release Quarter 2 2025 Press Release

Volatility를 이용한 memory forensics

  • 4. 4
  • 5. 5
  • 6. 6
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 2014
  • 17. 17 <Source : Volatility Google code>
  • 18. 18 Windows x86 Windows x64 Linux Mac OSX Windows XP Service Pack 2 and 3 Windows XP Service Pack 1 and 2 32-bit Linux kernels 2.6.11 to 3.5 32-bit 10.5.x Leopard Windows 2003 Server Service Pack 0, 1, 2 Windows 2003 Server Service Pack 1 and 2 64-bit Linux kernels 2.6.11 to 3.5 32-bit 10.6.x Snow Leopard Windows Vista Service Pack 0, 1, 2 Windows Vista Service Pack 0, 1, 2 OpenSuSE,CentOS 64-bit 10.6.x Snow Leopard Windows 2008 Server Service Pack 1, 2 Windows 2008 Server Service Pack 1 and 2 Ubuntu, Debian 32-bit 10.7.x Lion Windows 7 Service Pack 0, 1 Windows 2008 R2 Server Service Pack 0 and 1 Fedora, Mandriva 64-bit 10.7.x Lion Windows 7 Service Pack 0 and 1 64-bit 10.8.x Mountain Lion
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23 NOTE : Ubuntu Kernel에서는다음을추가실행이필요 # echo “/usr/local/lib” >> /etc/ld.so.conf # ldconfig
  • 24. 24 운영체제 분석 Process 분석 Network 분석 DLL 및Thread 분석 String 분석 Registry 분석
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 2014
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36
  • 37. 37
  • 38. 38
  • 39. 39
  • 40. 40
  • 41. 41
  • 42. 42
  • 43. 43
  • 44. 44
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. 50
  • 51. 51
  • 52. 2014
  • 53. 53
  • 54. 2014
  • 55. 55
  • 56. 56
  • 57. 57