Memory Forensics with Volatility - HackerSploit Blue Team Series
Offered By: Linode via YouTube
Course Description
Overview
Dive into memory forensics using Volatility, an open-source framework for incident response and malware analysis, in this comprehensive tutorial. Learn how to leverage Volatility in Blue Team hacking scenarios through practical demonstrations. Explore key concepts including installing Volatility, simulating system crashes with MemLabs, performing KDBG scans, extracting crucial information, identifying hidden processes, investigating process activities, and scanning for specific files. Gain hands-on experience in obtaining file hashes using Volatility and CyberChef, and discover additional modules to enhance your forensic capabilities. Perfect for cybersecurity professionals and enthusiasts looking to strengthen their memory analysis skills in incident response and malware detection.
Syllabus
Introduction
What We Will Be Covering
Pre Requisites
Introduction to Volatility
Learning Resources
Practical Demo
What is Volatility?
Using MemLabs to Simulate a Crash/Compromise
Install Volatility
Transfer MemLabs Files to this System
Install and Extract the MemLabs File
Open the Dump in Volatility
Perform KDBG Scan
Extracting Information
Identify Hidden Processes
Investigate What a Process Was Doing
What Commands Were Being Executed?
Scan and Extract a File
Obtain Hashes with Volatility & CyberChef
Exploring Additional Modules
Conclusion
Taught by
Linode
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax Android Malware Analysis - From Zero to Hero
Udemy How to Create and Embed Malware (2-in-1 Course)
Udemy