Detecting crypto containers
An important step in the investigation of user activity on Linux systems is to look for crypto containers, especially when it comes to investigating hosts used by potential threat actors. The fact is that, for their own safety, they can put important data related to the preparation for an attack, developed malicious tools, or stolen information into the crypto containers.
Linux-based systems have various encryption options ranging from dm-Crypt
to the more standard TrueCrypt
and VeraCrypt
. In fact, the process of detecting crypto containers and recovering encryption keys is almost the same as in Windows. Therefore, we will only discuss the main points.
Firstly, you can still use analysis of running processes to detect encryption containers because if a crypto container was opened on the system, you will still find the corresponding process in the list.
Second, for the most popular TrueCrypt solution, Volatility has a separate plugin to recover...