Memory Forensics with Volatility - HackerSploit Blue Team Series

Memory Forensics with Volatility - HackerSploit Blue Team Series

Linode via YouTube Direct link

Pre Requisites

3 of 21

3 of 21

Pre Requisites

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Memory Forensics with Volatility - HackerSploit Blue Team Series

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What We Will Be Covering
  3. 3 Pre Requisites
  4. 4 Introduction to Volatility
  5. 5 Learning Resources
  6. 6 Practical Demo
  7. 7 What is Volatility?
  8. 8 Using MemLabs to Simulate a Crash/Compromise
  9. 9 Install Volatility
  10. 10 Transfer MemLabs Files to this System
  11. 11 Install and Extract the MemLabs File
  12. 12 Open the Dump in Volatility
  13. 13 Perform KDBG Scan
  14. 14 Extracting Information
  15. 15 Identify Hidden Processes
  16. 16 Investigate What a Process Was Doing
  17. 17 What Commands Were Being Executed?
  18. 18 Scan and Extract a File
  19. 19 Obtain Hashes with Volatility & CyberChef
  20. 20 Exploring Additional Modules
  21. 21 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.