lense 0.1.26 → 0.1.27

Sign up to get free protection for your applications and to get access to all the features.
Files changed (4) hide show
  1. checksums.yaml +4 -4
  2. data/data/mfwvl1.yaml +51 -56
  3. data/lib/lense.rb +2 -3
  4. metadata +2 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 93081a4dd98c443306c190459fcd3005e51e8c06
4
- data.tar.gz: 9ecceca898731f2abcb7d97292dc3e24399fbc29
3
+ metadata.gz: 54de025704648557ef47653d51dd11713e0858ff
4
+ data.tar.gz: 209f2ab433994e0f0c980e6a46aa100404e0763f
5
5
  SHA512:
6
- metadata.gz: 9e71efcc4ad9c150a6095eb554d1dd5a58aa0bcbcb26f4f76f1c2c07264599fcdcad5d3c783361ff0989e1a63f0a75f2cd9661abdc5fb7df0f9a988ae8c11148
7
- data.tar.gz: 7eac7d1e887c6c1cbd310ac7a02c88bb1f09aece10096854c79f99ab2ccded0225264b0eb34478d7be433ea3fa7fa300a7377dcff0bcc8135d48d6e17dc6d5ce
6
+ metadata.gz: ecbbd3c9213572404a875a4e468d135709dc862193ae183d88d0808bfd75b9a8bcb919dca9633a91c97f95820d940b7bfd47ea26fa796eaa5b00d38805f00cc1
7
+ data.tar.gz: f6bc4e7681f767aea8bf84678f54b693cf9f01d8e6e58cbaa6a51455efc4b9ca5bb10a3f42a318cbe9cd2d2e3f54285f51f20d32e9d788be88c9a89e068163ca
data/data/mfwvl1.yaml CHANGED
@@ -1,57 +1,52 @@
1
1
  ---
2
- # Name of course. Should match website
3
- course:
4
- title: Memory Forensics With Volatility Lesson 1
5
- difficulty: 1
6
- authors:
7
- - name: Lance Lacoste
8
- email: lance.lacoste@gmail.com
9
-
10
- # Items to download. Should be placed in ~/.lense/<folder_name>
11
- data:
12
- # ~/.lense/courses/llacoste/mfwvl1/data/foo
13
- - rel: data
14
- url: https://drive.google.com/file/d/0B50xr4dwmqonNmtpa3pycGM4WXM/view?usp=sharing
15
- description: "why you need it?"
16
- # ~/.lense/courses/llacoste/mfwvl1/data/memdumps/foo
17
- - rel: data/memdumps
18
- url: https://drive.google.com/file/d/0B50xr4dwmqonNmtpa3pycGM4WXM/view?usp=sharing
19
- description: "why you need it?"
20
-
21
- # The final command to open in a new terminal.
22
- entry_point: docker run -v ~/.lense/mfwvl1/my_memory_sample.vmem:/data -i -t llacoste/docker_volatility
23
-
24
- # Begin the lesson.
25
- lesson_plan:
26
- - say: Load up volshell on the windows_xp.vmem image (volatility -f windows_xp.vmem volshell)
27
-
28
- - say: 'We are going to take a look at some TYPEs in volshell. Using the dt command inspect: _EPROCESS _ETHREAD _TOKEN'
29
- question:
30
- ask: What do you see?
31
- hint: 'Enter: dt("<TYPE>")'
32
- expect: '*'
33
-
34
- - say: Exit volshell and run pslist
35
- question:
36
- ask: What process has PID 296?
37
- expect: svchost.exe
38
-
39
- - say: Now run psscan
40
- question:
41
- ask: What is the offset of the explorer.exe process with PID 236
42
- expect: '0x0000000005201a08'
43
-
44
- - say: Now run pstree
45
- question:
46
- ask: What is the name of the first child process of explorer.exe with PID 236
47
- expect: vmtoolsd.exe
48
-
49
- - say: Now run psxview
50
- question:
51
- ask: What process has PID 296?
52
- expect: svchost.exe
53
-
54
- - say: You can look at the privileges of a process by using the privs plugin along with the -p flag. Use the -p flag on various plugins to focus on a particular process with the given PID i.e. -p 236 for explorer.exe. Run privs on explorer.exe
55
- question:
56
- ask: What are the privileges for SeImpersonatePrivilege
57
- expect: Present,Enabled,Default
2
+ title: Memory Forensics With Volatility Lesson 1
3
+ difficulty: 1
4
+ authors:
5
+ - name: Lance Lacoste
6
+ email: lance.lacoste@gmail.com
7
+
8
+ dependancies:
9
+ - data/my_memory_sample.vmem
10
+
11
+ # The final command to open in a new terminal.
12
+ up:
13
+ - docker run --name=%LENSE_NAME%_main -v $PWD/data:/data -i -t llacoste/docker_volatility
14
+
15
+ down:
16
+ - docker stop %LENSE_NAME%_main
17
+ - docker rm %LENSE_NAME%_main
18
+
19
+ # Begin the lesson.
20
+ lesson_plan:
21
+ - say: Load up volshell on the windows_xp.vmem image (volatility -f windows_xp.vmem volshell)
22
+
23
+ - say: 'We are going to take a look at some TYPEs in volshell. Using the dt command inspect: _EPROCESS _ETHREAD _TOKEN'
24
+ question:
25
+ ask: What do you see?
26
+ hint: 'Enter: dt("<TYPE>")'
27
+ expect: '*'
28
+
29
+ - say: Exit volshell and run pslist
30
+ question:
31
+ ask: What process has PID 296?
32
+ expect: svchost.exe
33
+
34
+ - say: Now run psscan
35
+ question:
36
+ ask: What is the offset of the explorer.exe process with PID 236
37
+ expect: '0x0000000005201a08'
38
+
39
+ - say: Now run pstree
40
+ question:
41
+ ask: What is the name of the first child process of explorer.exe with PID 236
42
+ expect: vmtoolsd.exe
43
+
44
+ - say: Now run psxview
45
+ question:
46
+ ask: What process has PID 296?
47
+ expect: svchost.exe
48
+
49
+ - say: You can look at the privileges of a process by using the privs plugin along with the -p flag. Use the -p flag on various plugins to focus on a particular process with the given PID i.e. -p 236 for explorer.exe. Run privs on explorer.exe
50
+ question:
51
+ ask: What are the privileges for SeImpersonatePrivilege
52
+ expect: Present,Enabled,Default
data/lib/lense.rb CHANGED
@@ -4,7 +4,7 @@ require 'highline/import'
4
4
  class LENSE
5
5
  attr_reader :config, :current_course
6
6
 
7
- VERSION = '0.1.26'
7
+ VERSION = '0.1.27'
8
8
  LENSE_DIR = File.join(ENV['HOME'],'.lense')
9
9
  COURSES_DIR = File.join(LENSE_DIR,'courses')
10
10
  CURRENT_COURSE_FILE = File.join(LENSE_DIR,'current_course')
@@ -71,7 +71,7 @@ class LENSE
71
71
  test_str = File.file?(test_file) ? File.read(test_file) : ''
72
72
  lense_file = Psych.load(test_str) || {}
73
73
 
74
- lense_file['course']['lesson_plan'].each do |lesson|
74
+ lense_file['lesson_plan'].each do |lesson|
75
75
  say question_separator
76
76
  say "#{say_prefix} #{lesson['say']}" if lesson['say']
77
77
 
@@ -84,7 +84,6 @@ class LENSE
84
84
  hint = lesson['question'] && lesson['question']['hint']
85
85
 
86
86
  show_hint = ''
87
-
88
87
  if hint && asked > hint_limit
89
88
  show_hint = "\n#{hint_prefix} #{hint}"
90
89
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: lense
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.26
4
+ version: 0.1.27
5
5
  platform: ruby
6
6
  authors:
7
7
  - Manuel Zubieta
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2015-04-23 00:00:00.000000000 Z
12
+ date: 2015-04-24 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: rake