Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Memory Forensics with Volatility - HackerSploit Blue Team Series

Linode via YouTube

Overview

Dive into memory forensics using Volatility, an open-source framework for incident response and malware analysis, in this comprehensive tutorial. Learn how to leverage Volatility in Blue Team hacking scenarios through practical demonstrations. Explore key concepts including installing Volatility, simulating system crashes with MemLabs, performing KDBG scans, extracting crucial information, identifying hidden processes, investigating process activities, and scanning for specific files. Gain hands-on experience in obtaining file hashes using Volatility and CyberChef, and discover additional modules to enhance your forensic capabilities. Perfect for cybersecurity professionals and enthusiasts looking to strengthen their memory analysis skills in incident response and malware detection.

Syllabus

Introduction
What We Will Be Covering
Pre Requisites
Introduction to Volatility
Learning Resources
Practical Demo
What is Volatility?
Using MemLabs to Simulate a Crash/Compromise
Install Volatility
Transfer MemLabs Files to this System
Install and Extract the MemLabs File
Open the Dump in Volatility
Perform KDBG Scan
Extracting Information
Identify Hidden Processes
Investigate What a Process Was Doing
What Commands Were Being Executed?
Scan and Extract a File
Obtain Hashes with Volatility & CyberChef
Exploring Additional Modules
Conclusion

Taught by

Linode

Reviews

Start your review of Memory Forensics with Volatility - HackerSploit Blue Team Series

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.