Skip to content

Run volatility on memory image and send results to Graylog

Notifications You must be signed in to change notification settings

megan201296/vol2graylog

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

vol2graylog

Description

This project can run Volatility against a memory images and output the results to Graylog. The mechanism for parsing and sending the results to Graylog is contained in the vol2log folder and was originally obtained from https://github.com/swelcher/vol2log.

Pre-Requisites

  • Volatility install
  • Graylog with HTTP Gelf Input set up

Usage

vol2graylog -d /path/to/output/directory -i /path/to/image -g 192.168.1.250 -p 12201 -v host
  • -d: path to directory where Volatility results will be outputed and read from.
  • -i: path to memory images to be analyzed
  • -g: IP of Graylog instance
  • -p: Port of listening HTTP Gelf Input in Graylog
  • -v: Name of the host of mem image (to be assigned as source in Graylog)

Currently Supported Volatility Commands

The following are the plugins currently supported:

  • malfind
  • connscan
  • pslist
  • netscan
  • dlllist
  • getsids
  • userassist
  • psscan
  • ldrmodules
  • psxview
  • modscan
  • apihooks
  • svcscan

I am currently working on testing and adding more. All plugins are included in the vol2graylog.sh script by default. I plan to add instructions on how to add plugins both to the program as a whole and how to adjust the script to run only plugins you are interested in.

About

Run volatility on memory image and send results to Graylog

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published