security analyst security skill risk: medium
Rekall Memory Forensics Artifact Extractor
The prompt provides instructions and Python code examples for using the Rekall framework to load memory images, run plugins such as pslist, psscan, malfind, and netscan, and detect…
- Policy sensitive
- Human review
SKILL 4 files · 2 folders
SKILL.md
---
name: extracting-memory-artifacts-with-rekall
description: "Uses Rekall memory forensics framework to analyze memory dumps for process hollowing, injected code via VAD"
---
# Extracting Memory Artifacts with Rekall
## When to Use
- When performing authorized security testing that involves extracting memory artifacts with rekall
- When analyzing malware samples or attack artifacts in a controlled environment
- When conducting red team exercises or penetration testing engagements
- When building detection capabilities based on offensive technique understanding
## Prerequisites
- Familiarity with security operations concepts and tools
- Access to a test or lab environment for safe execution
- Python 3.8+ with required dependencies installed
- Appropriate authorization for any testing activities
## Instructions
Use Rekall to analyze memory dumps for signs of compromise including process
injection, hidden processes, and suspicious network connections.
```python
from rekall import session
from rekall import plugins
# Create a Rekall session with a memory image
s = session.Session(
filename="/path/to/memory.raw",
autodetect=["rsds"],
profile_path=["https://github.com/google/rekall-profiles/raw/master"]
)
# List processes
for proc in s.plugins.pslist():
print(proc)
# Detect injected code
for result in s.plugins.malfind():
print(result)
```
Key analysis steps:
1. Load memory image and auto-detect profile
2. Run pslist and psscan to find hidden processes
3. Use malfind to detect injected/hollowed code in process VADs
4. Examine network connections with netscan
5. Extract suspicious DLLs and drivers with dlllist/modules
## Examples
```python
from rekall import session
s = session.Session(filename="memory.raw")
# Compare pslist vs psscan for hidden processes
pslist_pids = set(p.pid for p in s.plugins.pslist())
psscan_pids = set(p.pid for p in s.plugins.psscan())
hidden = psscan_pids - pslist_pids
print(f"Hidden PIDs: {hidden}")
```
REQUIRED CONTEXT
- memory image path
OPTIONAL CONTEXT
- specific plugins or analysis focus
EXPECTED OUTPUT
- Format
- markdown
- Constraints
- include code examples
- list analysis steps
- specify prerequisites and when to use
EXAMPLES
Includes two Python code examples demonstrating Rekall usage for memory analysis and hidden process detection.
CAVEATS
- Missing context
- Rekall version or installation method
- Expected output format or report template
- Memory image format constraints
- Ambiguities
- Does not specify desired output format or level of detail for analysis results.
- "Appropriate authorization" and "controlled environment" are not defined.
QUALITY
- OVERALL
- 0.71
- CLARITY
- 0.82
- SPECIFICITY
- 0.68
- REUSABILITY
- 0.71
- COMPLETENESS
- 0.64
IMPROVEMENT SUGGESTIONS
- Add explicit output format requirement (e.g., structured JSON report or bullet-point findings).
- Replace or note that Rekall is deprecated and suggest modern alternatives in a comment.
- Include placeholder variables for memory image path and profile URL to improve templating.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR SECURITY ANALYST
- Ransomware Network Indicators Analyzersecurity analystsecurity
- APT TTP Mapping with MITRE Navigatorsecurity analystsecurity
- Linux Persistence Mechanisms Analyzersecurity analystsecurity
- Azure AD Lateral Movement KQL Detectorsecurity analystsecurity
- Kerberos Golden Ticket Forgery Detectorsecurity analystsecurity
- LOLBAS Abuse Detection with Sigma Rulessecurity analystsecurity
- Shadow IT Cloud Usage Detectorsecurity analystsecurity
- Registry Run Key Persistence Detection Guidesecurity analystsecurity
- Detect Risky OAuth Consent Grants in Entra IDsecurity analystsecurity
- Windows Service Installation Threat Huntersecurity analystsecurity
- Web Server Log Intrusion Analyzersecurity analystsecurity
- RDP Brute Force Event Log Analyzersecurity analystsecurity
- Azure Activity Logs Threat Analyzersecurity analystsecurity
- Scapy Network Packet Analysis Guidesecurity analystsecurity
- TLS Certificate Transparency Log Analyzersecurity analystsecurity
- Cobalt Strike Malleable C2 Profile Analyzersecurity analystsecurity
- Email Account Compromise Detection Proceduressecurity analystsecurity
- Credential Stuffing Auth Log Analyzersecurity analystsecurity
- MISP Threat Intelligence Sharing with PyMISPsecurity analystsecurity
- MISP Threat Landscape Analysis Guidesecurity analystsecurity
- Malicious Scheduled Task Sysmon Detectorsecurity analystsecurity
- Kerberos Pass-the-Ticket Attack Detectorsecurity analystsecurity
- NTLM Relay Attack Event Log Analyzersecurity analystsecurity
- Linux Memory Forensics with LiME and Volatilitysecurity analystsecurity
- Insider Data Exfiltration DLP Analyzersecurity analystsecurity