Memory Forensics with Volatility - HackerSploit Blue Team Series
Offered By: Linode via YouTube
Course Description
Overview
Dive into memory forensics using Volatility, an open-source framework for incident response and malware analysis, in this comprehensive tutorial. Learn how to leverage Volatility in Blue Team hacking scenarios through practical demonstrations. Explore key concepts including installing Volatility, simulating system crashes with MemLabs, performing KDBG scans, extracting crucial information, identifying hidden processes, investigating process activities, and scanning for specific files. Gain hands-on experience in obtaining file hashes using Volatility and CyberChef, and discover additional modules to enhance your forensic capabilities. Perfect for cybersecurity professionals and enthusiasts looking to strengthen their memory analysis skills in incident response and malware detection.
Syllabus
Introduction
What We Will Be Covering
Pre Requisites
Introduction to Volatility
Learning Resources
Practical Demo
What is Volatility?
Using MemLabs to Simulate a Crash/Compromise
Install Volatility
Transfer MemLabs Files to this System
Install and Extract the MemLabs File
Open the Dump in Volatility
Perform KDBG Scan
Extracting Information
Identify Hidden Processes
Investigate What a Process Was Doing
What Commands Were Being Executed?
Scan and Extract a File
Obtain Hashes with Volatility & CyberChef
Exploring Additional Modules
Conclusion
Taught by
Linode
Related Courses
Information Security Management in a NutshellSAP Learning Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Enterprise Security Fundamentals
Microsoft via edX Planning a Security Incident Response
Microsoft via edX Introduction to Cybersecurity
Udacity