0% found this document useful (0 votes)
16 views6 pages

Lab 11

This document outlines Lab 11 for the CS-481 Computer Forensics course at NUST, focusing on memory forensics using Volatility 3. Students are required to install necessary software and complete various tasks related to analyzing memory images, including extracting browser history and password hashes. Deliverables must be submitted on LMS with proper identification before the deadline.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views6 pages

Lab 11

This document outlines Lab 11 for the CS-481 Computer Forensics course at NUST, focusing on memory forensics using Volatility 3. Students are required to install necessary software and complete various tasks related to analyzing memory images, including extracting browser history and password hashes. Deliverables must be submitted on LMS with proper identification before the deadline.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

National University of Sciences &

Technology (NUST)

School of Electrical Engineering and


Computer Science (SEECS)

Faculty of Computing

CS-481: Computer Forensics

Department of Software

Engineering Class: BESE-12 AB

Lab 11: Introduction to Memory Forensics with Volatility 3

CLO PLO (SE) BT-Level

CLO 2 Apply forensics procedures PLO-4 C-3


for case investigations. Investigation Applying

CLO 3 Demonstrate various PLO-5 P-3


forensics methods and Modern Tool Usage Guided Response
techniques through modern
tools to investigate contents
of various electronic devices.

Date: 21-04-2025

Time:

2:00 pm - 2:50 pm

3:00 pm - 3:50 pm

4:00 pm - 4:50 pm
Lab 11:

Introduction
This lab introduces students to using Volatility for digital investigation.

Objectives
The main objective of this lab is :
1. Learn memory forensics using Volatility.

Tools/Software Requirements
● Volatility, Powershell, and

HexD Description

Students are required to complete the tasks in this ‘Introduction to


Memory Forensics with Volatility 3’ https://www.youtube.com/watch?
v=Uk3DEgY5Ue8

For background information about memory analysis, please watch


https://www.youtube.com/watch?v=lI7ePcu6D7Q

Read the lab tasks carefully and complete them.

Deliverable:
Students are required to complete all tasks and upload a single
document with adequate evidence on LMS before the deadline.
Make sure your name, Qalam ID, and date are included on every
page of the document.

1
Task A: Install Volatility 3

1. Follow the steps in the video


https://www.youtube.com/watch?v=Uk3DEgY5Ue8 to install
volatility. Correct installation requires:
a. Python: https://python.org (get version >3)
b. Git for Windows: https://gitforwindows.org/
c. Microsoft C++ Build Tools:
https://visualstudio.microsoft.com/visual-cpp-
build-tools/
d. Python Snappy: https://www.cgohlke.com/#python-snappy
e. Volatility 3: https://github.com/volatilityfoundation/volatility3
2. Make sure you get the correct output for python vol.py -v
command
before proceeding further:

Task A: Analyse image of memory using Volatility 3

1. Download the memory image file


(https://ia803401.us.archive.org/view_archive.php?archive=/1/item
s/Africa- DFIRCTF-2021-WK02/20210430-Win10Home-20H2-64bit-
memdump.mem. 7z ) from https://archive.org/details/Africa-
DFIRCTF-2021-WK02 Run the windows.pslist module and search
for anything related to the chrome browser. Take a screenshot
that shows the command you used and information obtained
about the parent chrome process.

2
3
4
2. Find out any files with the word ‘history’ that is used by this
parent chrome process. Take a screenshot that shows the
command you used and the information you obtained.

3. Carve the file that contains John Doe’s chrome browsing history.
Open it in Windows Explorer and take a screenshot. Make sure
the size and the date modified are clearly visible.

4. Find out the hash value of John Doe’s password. Take a


screenshot that shows the command you used and information
you obtained.
5. Was Microsoft Edge ever used on this system? If so, for roughly
how long? Take a screenshot that shows the command you used
and the information you obtained.
6. Carve out John Doe’s ntuser.dat file and open it in HexD. Take a
screenshot that shows:
a. the command you used,
b. ntuser.dat file in Windows Explorer
c. the registry file header of ntuser.dat file in HexD.

You might also like