Johnny,
Machine B (Start Netcat on BackTrack Server) ------------------------------------------------- root@bt:/var/tmp# nc -l -vvv -p 4444 > lime.dd listening on [any] 4444 ... Machine A (On Metasploitable Server, Trying to send image to BackTrack[192.168.1.107]) ------------------------------------------------- root@metasploitable:/var/tmp/LIME/src# insmod lime-2.6.24-16-server.ko "path=tcp:4444 format=raw" | nc 192.168.1.107 4444
Sebastien,
My name is Johnny. I am trying to figure out how to use Lime with Volatility.
My end goal it to take and analyze the memory of a Vulnerable 8.04 VM made available by the Metasploitable Project.
+ Reference Link:http://sourceforge.net/projects/metasploitable/files/Metasploitable2/
I have been able to dump the memory (See Below)
root@metasploitable:/var/tmp/LIME/src# insmod lime-2.6.24-16-server.ko "path=/var/tmp/memory.dd format=raw" root@metasploitable:/var/tmp/LIME/src# ls -l /var/tmp/memory.dd -r--r--r-- 1 root root 536410112 2013-02-18 14:53 /var/tmp/memory.dd
Do you know how to send the memory using a netcat session from machine A to machine B? I tied to do the below, but it did not work.Machine B (Start Netcat on BackTrack Server) ------------------------------------------------- root@bt:/var/tmp# nc -l -vvv -p 4444 > lime.dd listening on [any] 4444 ... Machine A (On Metasploitable Server, Trying to send image to BackTrack[192.168.1.107]) ------------------------------------------------- root@metasploitable:/var/tmp/LIME/src# insmod lime-2.6.24-16-server.ko "path=tcp:4444 format=raw" | nc 192.168.1.107 4444
Thank you for any guidance,
Johnny
--Johnny A. ShaiebEducation
BS: Management Information Systems (Oklahoma State University)
MS: Telecommunications (Oklahoma State University)
MS: Computer Science / Computer Security (University of Tulsa)
NSTISSI Certified
4011: Information Security Professional
4012: Designated Approving Authority
4013: Administration in Information Systems Security
4014: Information Systems Security Officer