TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Offline Memory Forensics With Volatility

BHIS · 2025-04-08 · Read original ↗

ATT&CK techniques detected

4 predictions
T1003.002Security Account Manager
95%
“/ github. com / volatilityfoundation / volatility3. git cd volatility3 / python3 - m venv venv & &. venv / bin / activate pip install - e. [ dev ] once the tool is installed, we are ready to pull sam credentials for local administrator credentials. side note : this command could …”
T1003.002Security Account Manager
85%
“offline memory forensics with volatility offline memory forensics with volatility ben bowman is a security analyst at black hills information security. he graduated in 2024 with a degree in cyber operations. ben conducts research as well as tool development outside of testing. as…”
T1003.004LSA Secrets
77%
“a network, and you find an ipmi hash disclosure vulnerability on a server. you dump the hash and somehow successfully crack it. you log onto the server and note that the server hosts esxi. from here, you attempt to authenticate to esxi using the credentials, which, to your surpri…”
T1003.001LSASS Memory
34%
“/ github. com / volatilityfoundation / volatility3. git cd volatility3 / python3 - m venv venv & &. venv / bin / activate pip install - e. [ dev ] once the tool is installed, we are ready to pull sam credentials for local administrator credentials. side note : this command could …”

Summary

Volatility is a memory forensics tool that can pull SAM hashes from a vmem file. These hashes can be used to escalate from a local user or no user to a domain user leading to further compromise.

The post Offline Memory Forensics With Volatility appeared first on Black Hills Information Security, Inc..