Oh, oh, forget my
last posting: I’ve used the wrong offset for the SECURITY-Hive within
that example. SORRY.
Using an older SP2-dump
it worked fine. Found no wrong code within the script. ;-)
But the script was not
able to extract the LSA key from a SP3-dump.
Does anyone have a
solution for that? How the LSA key may get extracted otherwise? It MUST be
somewhere in the lsass-process, right?
TNX in advance and
sorry for the wrong posting again.
Cu
Michael
Von: Michael Felber ,
Steufa Chemnitz, IT-Forensik [mailto:MichaelFelber@gmx.net]
Gesendet: Donnerstag, 10. September 2009 16:42
An: 'vol-dev@volatilityfoundation.org'
Betreff: CashDump-Issue
Hello,
according a hint of Andreas (TNX!!)
I’ve tackled the problem of extracting cached domain credentials
from a memory-dump. At the end of my path of epiphany I saw that Volatility
already has a plugin doing that: hashdump.py. Great.
While giving it a try I only got error
messages like
Traceback (most recent call last):
File "volatility", line
219, in <module>
main()
File "volatility", line
215, in main
command.execute()
File
"memory_plugins\registry/hashdump.py", line 78, in execute
dump_memory_hashes(addr_space, types, self.opts.syshive, self.opts.samhive,
prof)
File
"C:\Micha\Forensics\Volatility\forensics\win32\hashdump.py", line
305, in dump_memory_hashes
dump_hashes(sysaddr,
samaddr, profile)
File
"C:\Micha\Forensics\Volatility\forensics\win32\hashdump.py", line
289, in dump_hashes
bootkey =
get_bootkey(sysaddr,profile)
File
"C:\Micha\Forensics\Volatility\forensics\win32\hashdump.py", line
131, in get_bootkey
class_data =
sysaddr.read(key.Class, key.ClassLength)
AttributeError: 'NoneType' object has no
attribute 'Class'
From my point of view as a programming noob
some type of type declaration is missed.
Or did I miss something? I have applied all
the recent patches posted in this list.
The full console dump is attached for
kindly being reviewed.
Cu
Mic