memory-forensics

This skill enables analysis of volatile memory dumps using tools like Volatility to identify malware, rootkits, and security breaches, supporting digital forensics investigations.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "memory-forensics" with this command: npx skills add alphaonedev/openclaw-graph/alphaonedev-openclaw-graph-memory-forensics

memory-forensics

Purpose

This skill enables analysis of volatile memory dumps using tools like Volatility to identify malware, rootkits, and security breaches, supporting digital forensics investigations.

When to Use

Use this skill during incident response for suspected breaches, when analyzing RAM dumps from compromised systems, or for proactive security assessments on endpoints with potential malware infections.

Key Capabilities

  • Parse memory dumps to extract processes, network connections, and injected code using Volatility's plugins.

  • Detect hidden processes and rootkits via checks for process hollowing or DKOM (Direct Kernel Object Manipulation).

  • Analyze hibernation files or pagefiles for artifacts like command history or encryption keys.

  • Support for multiple dump formats, including raw, VMware, and crash dumps, with automated profile detection.

Usage Patterns

Invoke this skill via CLI commands in a Python script or directly in a terminal. Always specify the memory dump file and required plugins. For automation, wrap commands in a function that handles file paths and outputs. Use environment variables for API keys if extending to cloud-based forensics tools.

Example pattern in Python:

import subprocess dump_file = 'memory.dmp' subprocess.run(['volatility', '-f', dump_file, 'pslist'])

Common Commands/API

Use Volatility framework commands for core functionality. Set the VOLATILITY_PROFILE env var for profile mismatches, e.g., $VOLATILITY_PROFILE=Win7SP1x64 .

  • Command: volatility -f memory.dmp imageinfo — Identifies the OS profile from the dump.

  • Flags: -f for file path, --profile=Win10x64 to override auto-detection.

  • Command: volatility -f memory.dmp malfind — Scans for injected code or malware hooks.

  • Example: Pipe output: volatility -f memory.dmp malfind > malware_output.txt

  • API Endpoint: If using Volatility3 via Python API, import as from volatility3.framework import interfaces , then call interfaces.configuration.ConfObject() for configurations.

  • Snippet: from volatility3 import framework config = framework.require_plugin('windows').build_configuration() config['primary'] = 'memory.dmp'

  • Config Format: JSON-based, e.g., {"plugin": "pslist", "dumpfile": "memory.dmp"} for custom runs.

Integration Notes

Integrate by installing Volatility via pip (pip install volatility ), then call from scripts. For authentication in cloud forensics (e.g., AWS Memory DB analysis), use env vars like $AWS_ACCESS_KEY_ID and $AWS_SECRET_ACCESS_KEY . Ensure the skill runs in a isolated environment to avoid contamination; pass dump files via secure paths. For multi-tool integration, chain with tools like strings or YARA by piping outputs, e.g., volatility -f memory.dmp strings | grep suspicious .

Error Handling

Handle common errors by checking Volatility's exit codes; e.g., if profile not found, use imageinfo first. For file not found errors, validate paths before running. In scripts, wrap commands in try-except blocks:

try: result = subprocess.run(['volatility', '-f', 'memory.dmp', 'pslist'], capture_output=True, check=True) except subprocess.CalledProcessError as e: print(f"Error: {e.returncode} - {e.stderr.decode()}")

Log detailed errors for debugging, and use $VOLATILITY_DEBUG=1 env var to enable verbose output.

Concrete Usage Examples

  • Detect Malware in a Windows Dump: Load a memory dump from a suspected infected machine and scan for anomalies.

  • Command: volatility -f infected.dmp --profile=Win10x64 malfind

  • Steps: First run volatility -f infected.dmp imageinfo to confirm profile, then analyze output for PID and virtual address of suspicious processes.

  • Investigate Rootkit Presence: Analyze a Linux memory dump for hidden kernel modules.

  • Command: volatility -f linux.dmp linux_pslist

  • Steps: Cross-reference with linux_modules to spot discrepancies, then use strings on flagged addresses for further inspection.

Graph Relationships

  • Related to: blue-team cluster skills like "incident-response" (depends on outputs) and "threat-intelligence" (provides input data).

  • Connected via: tags such as "forensics" and "security", linking to skills like "network-forensics" for comprehensive breach analysis.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

iot-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

macos-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

threat-hunting

No summary provided by upstream source.

Repository SourceNeeds Review