Главная
Study mode:
on
1
Introduction
2
What We Will Be Covering
3
Pre Requisites
4
Introduction to Volatility
5
Learning Resources
6
Practical Demo
7
What is Volatility?
8
Using MemLabs to Simulate a Crash/Compromise
9
Install Volatility
10
Transfer MemLabs Files to this System
11
Install and Extract the MemLabs File
12
Open the Dump in Volatility
13
Perform KDBG Scan
14
Extracting Information
15
Identify Hidden Processes
16
Investigate What a Process Was Doing
17
What Commands Were Being Executed?
18
Scan and Extract a File
19
Obtain Hashes with Volatility & CyberChef
20
Exploring Additional Modules
21
Conclusion
Description:
Dive into memory forensics using Volatility, an open-source framework for incident response and malware analysis, in this comprehensive tutorial. Learn how to leverage Volatility in Blue Team hacking scenarios through practical demonstrations. Explore key concepts including installing Volatility, simulating system crashes with MemLabs, performing KDBG scans, extracting crucial information, identifying hidden processes, investigating process activities, and scanning for specific files. Gain hands-on experience in obtaining file hashes using Volatility and CyberChef, and discover additional modules to enhance your forensic capabilities. Perfect for cybersecurity professionals and enthusiasts looking to strengthen their memory analysis skills in incident response and malware detection.

Memory Forensics with Volatility - HackerSploit Blue Team Series

Linode
Add to list
0:00 / 0:00