Threat Level: green Handler on Duty: Rob VandenBrink

SANS ISC: Live memory analysis using Rekall - SANS Internet Storm Center SANS ISC InfoSec Forums

Participate: Learn more about our honeypot network

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Live memory analysis using Rekall

If you are doing memory forensics using Volatility, maybe you have noticed that one of the disadvantages that you can’t do a live analysis. If you need to do live memory forensics, then Rekall is your best friend.

Rekall can be obtained from the following location:

Rekall supports the following Operation systems:

  • Microsoft Windows XP Service Pack 2 and 3
  • Microsoft Windows 7 Service Pack 0 and 1
  • Microsoft Windows 8 and 8.1
  • Microsoft Windows 10
  • Linux Kernels 2.6.24 to most recent.
  • OSX 10.7-10.12.x.

For this diary, I am going to use Rekall for Windows. The installation is straightforward.

Rekall needs to be run as administrator to perform the live analysis. Unfortunately, sometimes you need to specify the profile to do the analysis. To find the right profile type the following command inside the Rekall console:

version_scan name_regex="krnl"


Now locate the guid for ntkrnlmp.pdb

In my case its “5B396742883C48D0AB74C7374DEEE9161”

Now exit from rekall console by typing:



Now run rekall again with the following command (notice that I have provided the guid in the command):

rekal live --profile=nt/GUID/5B396742883C48D0AB74C7374DEEE9161


Now we can play with rekall , here are some examples,


To list the available plugins


List the running process:



To list the process tree:


To view the services and save the output to services.txt




60 Posts
ISC Handler
Dec 25th 2018

Sign Up for Free or Log In to start participating in the conversation!