Linux Memory Acquisition with LiME | HackerSploit Blue Team Training

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=o4JMVh2xVkw



Duration: 14:09
1,183 views
27


Continuing our Blue Team Training series, @HackerSploit will cover the importance of memory acquisition using LiME. LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices. In this video, we'll show how to build the LiME kernel object and how to dump Linux memory with LiME for analysis.

The full Blue Team Training series is available here: https://www.youtube.com/playlist?list=PLTnRtjQN5ieZuL1qgfAQxEIg1Bw4hS8wM

Chapters:
0:00 Introduction
0:44 What We’ll Be Covering
1:00 Pre Requisites
1:53 What is Memory Acquisition?
3:58 Introduction to LiME
6:29 Learning Resources
6:39 Practical Demo
6:51 Making LiME
11:01 Load the Kernel Object
12:31 Locate the RAM Dump File
12:57 Conclusion


New to Linode? Get started here with a $100 credit → https://www.linode.com/linodetube
Check out LiME on Github → https://github.com/504ensicsLabs/LiME
Watch Hackersploit's Red Team Series → https://www.youtube.com/watch?v=Vdd4lRXB7zE&list=PLTnRtjQN5iea6dLA_4i3qFFX0kwvdL0bL&index=1&t=0s
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#Linode #cybersecurity #hackersploit
Product: Linode, Hackersploit, LiME; @HackerSploit




Other Videos By Akamai Developer


2023-03-20The 21 Docker Commands Every Developer Needs to Know
2023-03-17All-In-One Open Source Security Scanner | Docker Image Analysis with Trivy
2023-03-15How to Install and Configure an NFS Linux Server and Client
2023-03-13Run Terminals INSIDE Terminals | The Screen Command on Linux
2023-03-10Disk Analysis with Autopsy | HackerSploit Blue Team Training
2023-03-08Passky Password Manager | Take Control of Your Passwords
2023-03-06Never Lose Anything Again With Homebox on Docker | Homebox Home Inventory Management
2023-03-03Memory Forensics with Volatility | HackerSploit Blue Team Series
2023-03-01Fundamentals of svn | Top Docs with Jay LaCroix
2023-02-27Create Your Own URL Shortener Complete with Analytics | Docker YOURLS Tutorial
2023-02-24Linux Memory Acquisition with LiME | HackerSploit Blue Team Training
2023-02-22Hostnames and Domains on Linux Servers | Top Docs with Jay LaCroix
2023-02-20Build a Fully Featured News App Using NewsAPI and Bootstrap
2023-02-17Monitor in Real-Time with OSSEC | See What’s Taking Place in Your Server
2023-02-15Supercharged Linux Commands | bat Makes cat Even More Useful
2023-02-13Deploying a Django App to a Linux Server | Django App from Scratch Pt6
2023-02-10Easily Create Your Own Scalable Dropbox Clone With Object Storage (with up to 250 GB of storage)
2023-02-08Quickly Authenticate Users with FastAPI and Token Authentication
2023-02-06Finishing a Django Dictionary App | Getting Ready to Deploy Pt 5-6
2023-02-03Whoogle it! Get Search Results WITHOUT Ads with this Self-Hosted Search Engine
2023-02-01How to Deploy and Secure Your MERN App on Linode (NGINX, PM2)



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
digital forensics
linode tutorial
linode server setup
linode free trial
hackersploit
blue team
lime
cybersecurity
cybersecurity careers
linux tutorial
cyber security
linux for hacking
blue team cyber security
blue team cyber security training
linux for hacker
linux security
ethical hacking
information security
cyber security careers
linux privilege escalation
linux hacking