Hi Robert,
Have you tried using filescan to find the files on the TC volume? In
the original experiment did you leave the TC volume open?
The handles plugin enumerates handles for processes that are found in
the process list by default. It's possible that earlier, the process
that had that handle open to Test.txt was still running and in later
experiments you killed that process, causing it to disappear from the
process list and therefore its handles were not output.
Try filescan to pick up these files and see if you still see them. If
your end goal is to extract them from memory, you can use the dumpfiles
plugin and supply the physical offset of the _FILE_OBJECT (obtained from
filescan) like so:
vol.exe -f memdump.mem --profile=Win7SP1x64 -Q OFFSET -D OUTPUTDIR
All the best,
-Jamie
On 4/27/14 11:02 AM, Robert Merriott wrote:
Hello
I've been testing volatility and looking through the results. In
particular, within the Handles extraction, I found the following line...
0xfffffa8009648800 3544 0x1a78 0x120089 File
\Device\TrueCryptVolumeK\Test.txt
This is a file that I had stored in a hidden volume. I attempted to
re-create this type of entry with 3 further memory dumps with no such
success (No files within TrueCrypt volume). Can anyone advise why this
filename "Test.txt" was found? I see that a lot of files can be found
in the Handles extraction, but haven't been able to find any
documentation on how files are included in this section.
I ran the following command on an 8GB Memory dump which was captured
via FTK Imager...
vol.exe -f memdump.mem --profile=Win7SP1x64 --output=text
--output-file=handles-files.txt handles -t File
This result was a total surprise to find. In further testing, I
attempted to do the following within the hidden volume...
- Create new files
- Copy files into the volume
- Leave files open while closing the volume within TrueCrypt
Thanks,
R
_______________________________________________
Vol-users mailing list
Vol-users(a)volatilityfoundation.org
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
--
Jamie Levy (@gleeda)
Blog:
http://volatility-labs.blogspot.com/
GPG:
http://pgp.mit.edu/pks/lookup?op=get&search=0x196B2AB527A4AC92
Fingerprint: 2E87 17A1 EC10 1E3E 11D3 64C2 196B 2AB5 27A4 AC92