Memory Forensics with Volatility | HackerSploit Blue Team Series

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=2S_pi9qnIo8



Duration: 34:46
1,235 views
40


Volatility is an open source memory forensics framework for incident response and malware analysis. In this video, @HackerSploit will cover some examples of how to use Volatility in a Blue Team hacking scenario.

Chapters:
0:09 Introduction
1:11 What We Will Be Covering
1:43 Pre Requisites
2:02 Introduction to Volatility
3:31 Learning Resources
4:24 Practical Demo
4:32 What is Volatility?
7:49 Using MemLabs to Simulate a Crash/Compromise
10:05 Install Volatility
10:33 Transfer MemLabs Files to this System
11:39 Install and Extract the MemLabs File
12:15 Open the Dump in Volatility
15:37 Perform KDBG Scan
17:51 Extracting Information
19:29 Identify Hidden Processes
20:31 Investigate What a Process Was Doing
21:59 What Commands Were Being Executed?
23:38 Scan and Extract a File
30:01 Obtain Hashes with Volatility & CyberChef
31:52 Exploring Additional Modules
34:00 Conclusion


New to Linode? Get started here with a $100 credit → https://www.linode.com/linodetube
Check out the Volatility Github Repo → https://github.com/volatilityfoundation/volatility
Learn more about MemLabs→ https://github.com/stuxnet999/MemLabs
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#Hackersploit #BlueTeam #Volatility
Product: Cybersecurity, Volatility, hacking; @HackerSploit ;




Other Videos By Akamai Developer


2023-03-27Build And Deploy A Full Django API on Linode | Code With Tomi
2023-03-24Incident Response with Fireeye | Final Hackersploit Blue Team Training
2023-03-22Build Your Own Video Streaming Platform | It's Easier Than You Might Think!
2023-03-20The 21 Docker Commands Every Developer Needs to Know
2023-03-17All-In-One Open Source Security Scanner | Docker Image Analysis with Trivy
2023-03-15How to Install and Configure an NFS Linux Server and Client
2023-03-13Run Terminals INSIDE Terminals | The Screen Command on Linux
2023-03-10Disk Analysis with Autopsy | HackerSploit Blue Team Training
2023-03-08Passky Password Manager | Take Control of Your Passwords
2023-03-06Never Lose Anything Again With Homebox on Docker | Homebox Home Inventory Management
2023-03-03Memory Forensics with Volatility | HackerSploit Blue Team Series
2023-03-01Fundamentals of svn | Top Docs with Jay LaCroix
2023-02-27Create Your Own URL Shortener Complete with Analytics | Docker YOURLS Tutorial
2023-02-24Linux Memory Acquisition with LiME | HackerSploit Blue Team Training
2023-02-22Hostnames and Domains on Linux Servers | Top Docs with Jay LaCroix
2023-02-20Build a Fully Featured News App Using NewsAPI and Bootstrap
2023-02-17Monitor in Real-Time with OSSEC | See What’s Taking Place in Your Server
2023-02-15Supercharged Linux Commands | bat Makes cat Even More Useful
2023-02-13Deploying a Django App to a Linux Server | Django App from Scratch Pt6
2023-02-10Easily Create Your Own Scalable Dropbox Clone With Object Storage (with up to 250 GB of storage)
2023-02-08Quickly Authenticate Users with FastAPI and Token Authentication



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
linode tutorial
linode server setup
hackersploit
blue team
cybersecurity
hacker exploit
cybersecurity careers
hacking
blue team course
red team vs blue team
blue team training
cyber security
blue team cyber training
cybersecurity for beginners
cyber security career
information security
cybersecurity training
cyber security tutorial
penetration testing linux