I had downloaded and installed Ubuntu 22.04.36LTS which is pretty much stable.
sudo apt update sudo apt install golang-go
To get the debug symbols for this OS:
git clone https://github.com/volatilityfoundation/dwarf2json.git
cd dwarf2json/
go build
git clone https://github.com/volatilityfoundation/dwarf2json.git
Next step:
echo "deb http://ddebs.ubuntu.com $(lsb_release -cs) main restricted universe multiverse
deb http://ddebs.ubuntu.com $(lsb_release -cs)-updates main restricted universe multiverse
deb http://ddebs.ubuntu.com $(lsb_release -cs)-proposed main restricted universe multiverse" | \
sudo tee -a /etc/apt/sources.list.d/ddebs.list
$ sudo apt install ubuntu-dbgsym-keyring
$ sudo apt update
$ sudo apt install linux-image-$(uname -r)-dbgsym
Saving the debug symbol to json file format:
$ sudo ./dwarf2json linux --elf /usr/lib/debug/boot/vmlinux-$(uname -r) > linux-image-$(uname -r)-amd64.json
As extra I am also creating system map json file:
$ sudo ./dwarf2json linux --elf /usr/lib/debug/boot/vmlinux-$(uname -r) --system-map /boot/System.map-$(uname -r) > linux-image-$(uname -r)-amd64-SystemMap.json
$ sudo apt update
$ sudo apt install git build-essential kernel-headers-$(uname -r) dkms
$ git clone https://github.com/504ensicsLabs/LiME.git
$ cd LiME/src
$ make
$ sudo insmod /home/kali/LiME/src/lime-6.2.0-36-generic.ko path=/home/kali/memdump.lime format=lime
$ cp /home/kali/dwarf2json/linux-image-6.2.0-36-generic-amd64.json /home/kali/volatility3/volatility3/symbols/
linux-image-6.2.0-36-generic-amd64.json
$ cp /home/kali/dwarf2json/linux-image-6.2.0-36-generic-amd64-SystemMap.json /home/kali/volatility3/volatility3/symbols/
linux-image-6.2.0-36-generic-amd64-SystemMap.json
After this our linux profile is created for this ubuntu 22.04 version.
Once Memory dump is saved as memorydump.lime in the Ubuntu system, I tested it with the volatility3 with the following commands:
- PsList: Lists active processes in the memory image.
- PsScan: Scans for processes in the memory image by walking the process list.
- PsTree: Displays active processes in a parent-child relationship tree structure.
- Banners: Identifies and prints the operating system banner information from the memory image.
- Capabilities: Lists the Linux capabilities for each process.
- Check Modules: Compares the loaded modules list against the module list obtained from sysfs.
- Check Syscall: Checks the system call table for unexpected modifications (hooks).
- Elfs: Lists ELF executables and shared libraries mapped into process address spaces.
- Envvars: Lists environment variables for each process.
- IOMem: Provides information similar to what is available in /proc/iomem on a live Linux system.
- Keyboard_Notifiers: Analyzes keyboard notifier call chains for hooks.
- KMSG: Reads the kernel log buffer messages.
- Lsmod: Lists currently loaded kernel modules.
- Lsof: Lists open file descriptors across all processes.
- Malfind: Searches for memory regions within processes that may contain injected code.
- Mountinfo: Lists mount points and mount namespaces for processes.
- Proc.Maps: Lists all memory-mapped files for each process.
- PsAux: Lists processes along with their command-line arguments.
- Sockstat: Lists network connections and sockets for each process.
- tty_check: Checks tty devices for hooks or manipulations.
- FrameworkInfo: Provides details about the Volatility framework's components and configuration.
- IsfInfo: Displays information about the available Intermediate Symbol Format (ISF) files.
- LayerWriter: Writes out the data from a specified memory layer (used for debugging and analysis).
- Check_afinfo: Verifies the operation function pointers for network protocols to check for rootkits.
- Check_creds: Looks for processes that are sharing credential structures, which could indicate credential reuse or theft.
- Check_idt: Checks the Interrupt Descriptor Table (IDT) for unexpected modifications, which could indicate rootkit activity.
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.pslist
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.psscan
3] PsTree [Didn’t worked ]
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.pstree
4] Banners
$ sudo python3 vol.py -f /home/kali/memdump.lime banners.Banners
5] Capabilities [Didn’t worked]
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.capabilities.Capabilities
6] Check Modules
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.check_modules.Check_modules
7] Check syscall
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.check_syscall.Check_syscall
8] Elfs
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.elfs.Elfs
9] Envvars
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.envvars.Envvars
10] IOMem
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.iomem.IOMem
11] Keyboard_Notifiers
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.keyboard_notifiers.Keyboard_notifiers
12] KMSG
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.kmsg.Kmsg
13] Lsmod
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.lsmod.Lsmod
14] Lsof
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.lsof.Lsof
15] Malfind
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.malfind.Malfind
16] Mountinfo
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.mountinfo.MountInfo
17] Proc.Maps
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.proc.Maps
18] Psaux
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.psaux.PsAux
19] Sockstat
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.sockstat.Sockstat
20] tty_check
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.tty_check.tty_check
21] frameworkinfo.FrameworkInfo
$ sudo python3 vol.py -f /home/kali/memdump.lime frameworkinfo.FrameworkInfo
22] isfinfo.IsfInfo
$ sudo python3 vol.py -f /home/kali/memdump.lime isfinfo.IsfInfo
23] layerwriter.LayerWriter
$ sudo python3 vol.py -f /home/kali/memdump.lime layerwriter.LayerWriter
24] Check_afinfo [Didn’t worked]
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.check_afinfo.Check_afinfo
25] Check_creds
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.check_creds.Check_creds
26] Check_idt
$ sudo python3 vol.py -f /home/kali/memdump.lime linux.check_idt.Check_idt