contributing patches.
Here is a break down of the placements and prizes
Xabier Ugarte-Pedrero from Cisco Talos for PyREBox
KSL Group (Kyle Ness, Shachaf Atun, and Liam Stein) for Threadmap
3rd place and $250 USD cash goes to:
Peter Kálnai and Michel Poslušný from ESET for Browserhooks
4th place and Volatility Swag goes to:
(tie) Michael Brown for SQLite Artifacts and Adam Bridge for Linux (X) Windows
Frank Block for Linux Glibc Heap Analysis
Here is a detailed summary of the submissions. If you have feedback for the authors, we’re sure they’d love to hear your thoughts.
Something magical happens when reverse engineers write Volatility plugins. Peter and Michal from ESET have been tracking banking trojans and MITB malware for a while now, documenting the methods that malicious authors take to subvert victim systems – in particular, how they find and hook the SSL VMT (virtual method table) even in browsers such as Chromium-based browsers that static link with the SSL libraries, change regularly, and don’t export the table locations. Studying the pros/cons of attacker methodologies, learning from them in order to create a more robust detection platform, and immediately transitioning that knowledge into a capability analysts can use (via Volatility) requires a unique skill set. In addition to exploring these previously undetected API hooks, the authors also extended Volatility’s apihooks plugin to work on WOW64 processes (32-bit processes on a 64-bit architecture) and integrated their work into VolUtility – a submission to last year’s plugin contest.
https://github.com/eset/volatility-browserhooks
https://www.virusbulletin.com/conference/vb2017/abstracts/browser-attack-points-still-abused-banking-trojans
https://www.virusbulletin.com/uploads/pdf/conference_slides/2017/Kalnai-VB2017-browser-attack-points-trojans.pdf
4th (tie): Adam Bridge: Linux (X) Windows & Atoms
https://twitter.com/bridgeythegeek
https://github.com/bridgeythegeek
5th: Frank Block: Linux Glibc Heap Analysis
Frank’s submission to this year’s contest introduces a library to parse the user mode heap of a process using Glibc (currently supports x86/x64 and Glibc versions 2.20 – 2.25), an API for developers to create their own plugins, and two example plugins that demonstrate the forensic value – command shell history (zsh) and password management (keepassx). We are super impressed with the level of effort Frank put into this suite of tools. Not only did he implement a model of multiple Glibc versions, but he documented the library’s internals, produced a 60+ page academic technical report and published a condensed 10-page DFRWS paper.
https://authors.elsevier.com/sd/article/S1742287617301895 (DFRWS Paper)
https://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/8340
https://insinuator.net/author/fblock/
The following submissions appear in the order they were received. As previously mentioned, these developers deserve huge props. We look forward to seeing future work by these authors!
Mark’s work on integrating Volatility output into the Autopsy GUI will undoubtedly make life easier for many investigators. Whether they’re not familiar with using command line tools, they’re uncomfortable in a Linux environment, or if they just want to save time and visualize memory artifacts across various different cases in the same interface, this is a huge advantage for Autopsy users. The module includes a generic interface that allows running any Volatility plugin that supports SQLite rendering. It also contains more specialized modules that take the output of Volatility’s dumpfiles (extract files from RAM) and imagecopy (convert hiber/crash to raw) plugins and make their results available in Autopsy as well, creating a near full circle of analysis between disk and memory, all captured in the same GUI.
https://twitter.com/markmckinnon
https://github.com/markmckinnon
https://www.linkedin.com/in/mark-mckinnon-9b08715
https://medium.com/@markmckinnon_80619
https://github.com/markmckinnon/Autopsy-Plugins/tree/master/Volatility
https://medium.com/@markmckinnon_80619/volatility-autopsy-plugin-module-8beecea6396
https://vallejo.cc/
https://github.com/vallejocc
https://twitter.com/vallejocc
Here are a few additional resources regarding previous contests and community-driven plugins:
Volatility Foundation Contest Home Page: https://volatilityfoundation.org/contest
Volatility 2016 Plugin Contest Results: https://volatilityfoundation.org/2016
Volatility 2015 Plugin Contest Results: https://volatilityfoundation.org/2015Volatility 2014 Plugin Contest Results: https://volatilityfoundation.org/2014-cjpn
Volatility 2013 Plugin Contest Results: https://volatilityfoundation.org/2013-c19yz
Volatility Community GitHub Repository: https://github.com/volatilityfoundation/community