[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#728251: marked as done (ITP: volatility -- advanced memory forensics framework)



Your message dated Fri, 29 Nov 2013 17:00:10 +0000
with message-id <E1VmRQI-0007lr-D7@franck.debian.org>
and subject line Bug#728251: fixed in volatility 2.3.1-1
has caused the Debian Bug report #728251,
regarding ITP: volatility -- advanced memory forensics framework
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
728251: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728251
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Joao Eriberto Mota Filho <eriberto@eriberto.pro.br>

* Package name    : volatility
  Version         : 2.3
  Upstream Author : Volatility Foundation <volatility@volatilityfoundation.org>
* URL             : https://code.google.com/p/volatility
* License         : GPL2
  Programming Lang: Python
  Description     : advanced memory forensics framework

 The Volatility Framework is a completely open collection of tools for the
 extraction of digital artifacts from volatile memory (RAM) samples. It is
 useful in forensics analysis. The extraction techniques are performed
 completely independent of the system being investigated but offer
 unprecedented visibilty into the runtime state of the system.
 .
 Volatility supports memory dumps from all major 32- and 64-bit Windows
 versions and service packs including XP, 2003 Server, Vista, Server 2008,
 Server 2008 R2, and Seven. Whether your memory dump is in raw format, a
 Microsoft crash dump, hibernation file, or virtual machine snapshot,
 Volatility is able to work with it.
 .
 Linux memory dumps in raw or LiME format is supported too. There are several
 plugins for analyzing 32- and 64-bit Linux kernels and distributions such as
 Debian, Ubuntu, OpenSuSE, Fedora, CentOS, and Mandrake.
 .
 Volatility support 38 versions of Mac OSX memory dumps from 10.5 to 10.8.3
 Mountain Lion, both 32- and 64-bit. Android phones with ARM processors are
 also supported.
 .
 These are some of the data that can be extracted:
    .
    - Image information (date, time, CPU count).
    - Running processes.
    - Open network sockets and connections.
    - OS kernel modules loaded.
    - Memory maps for each process.
    - Executables samples.
    - Command histories.
    - Passwords, as LM/NTLM hashes and LSA secrets.
    - Others.

--- End Message ---
--- Begin Message ---
Source: volatility
Source-Version: 2.3.1-1

We believe that the bug you reported is fixed in the latest version of
volatility, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 728251@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho <eriberto@eriberto.pro.br> (supplier of updated volatility package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 02 Nov 2013 01:10:33 -0200
Source: volatility
Binary: volatility
Architecture: source all
Version: 2.3.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian Forensics <forensics-devel@lists.alioth.debian.org>
Changed-By: Joao Eriberto Mota Filho <eriberto@eriberto.pro.br>
Description: 
 volatility - advanced memory forensics framework
Closes: 728251
Changes: 
 volatility (2.3.1-1) unstable; urgency=low
 .
   * Initial release (Closes: #728251)
Checksums-Sha1: 
 60bd58291af4f842d0beeb5d710062b3b038a3d7 1367 volatility_2.3.1-1.dsc
 2b5d391e83bfbefc178482ea16ed17e64d52a724 1764063 volatility_2.3.1.orig.tar.gz
 06ac5d226f68f4c3e11e3e198c21a0e8c013c623 10200 volatility_2.3.1-1.debian.tar.gz
 b48b0886b7ada5f9f9f5aa6ff73e0338cfc919af 538920 volatility_2.3.1-1_all.deb
Checksums-Sha256: 
 5ff193add5f6eadec33bb389c5b91a1922b43d54746a82ee00281952c5f21813 1367 volatility_2.3.1-1.dsc
 bb1411fc671e0bf550a31e534fb1991b2f940f1dce1ebe4ce2fb627aec40726c 1764063 volatility_2.3.1.orig.tar.gz
 027e3046dc6352081fd39200229d84d4bd25c0db1e9a50632ddf164b70c3f4fd 10200 volatility_2.3.1-1.debian.tar.gz
 b9571e14b2a435fe6e6bfb4697d04fe14296ed97172ee34a692ce2cdf0717e50 538920 volatility_2.3.1-1_all.deb
Files: 
 6aaff8c992c184e9f82f3c846a3ad0cf 1367 utils optional volatility_2.3.1-1.dsc
 816325c01baa2ef87b8e2283b4b1a8e4 1764063 utils optional volatility_2.3.1.orig.tar.gz
 6cb8d316a3c7eaf2bbde897ba744698e 10200 utils optional volatility_2.3.1-1.debian.tar.gz
 c5e86e9b2592ad14ae00596a2c08e027 538920 utils optional volatility_2.3.1-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlJ3anQACgkQ2N9T+zficugNfACdGoOiNR4HEsr4JigeuT714sbx
5rcAoIaBKTMwqOtKIWfj6zdWyL49XRsU
=PIZB
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: