YoVDO

Memory Forensics with Volatility - HackerSploit Blue Team Series

Offered By: Linode via YouTube

Tags

Digital Forensics Courses Cybersecurity Courses Malware Analysis Courses Incident Response Courses Memory Forensics Courses

Course Description

Overview

Dive into memory forensics using Volatility, an open-source framework for incident response and malware analysis, in this comprehensive tutorial. Learn how to leverage Volatility in Blue Team hacking scenarios through practical demonstrations. Explore key concepts including installing Volatility, simulating system crashes with MemLabs, performing KDBG scans, extracting crucial information, identifying hidden processes, investigating process activities, and scanning for specific files. Gain hands-on experience in obtaining file hashes using Volatility and CyberChef, and discover additional modules to enhance your forensic capabilities. Perfect for cybersecurity professionals and enthusiasts looking to strengthen their memory analysis skills in incident response and malware detection.

Syllabus

Introduction
What We Will Be Covering
Pre Requisites
Introduction to Volatility
Learning Resources
Practical Demo
What is Volatility?
Using MemLabs to Simulate a Crash/Compromise
Install Volatility
Transfer MemLabs Files to this System
Install and Extract the MemLabs File
Open the Dump in Volatility
Perform KDBG Scan
Extracting Information
Identify Hidden Processes
Investigate What a Process Was Doing
What Commands Were Being Executed?
Scan and Extract a File
Obtain Hashes with Volatility & CyberChef
Exploring Additional Modules
Conclusion


Taught by

Linode

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy