If playback doesn't begin shortly, try restarting your device.
•
You're signed out
Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.
CancelConfirm
Share
An error occurred while retrieving sharing information. Please try again later.
20,561 views • Mar 3, 2023 • #Volatility #BlueTeam #Hackersploit
Show less
Volatility is an open source memory forensics framework for incident response and malware analysis. In this video, @HackerSploit will cover some examples of how to use Volatility in a Blue Team hacking scenario.
Chapters:
0:09 Introduction
1:11 What We Will Be Covering
1:43 Pre Requisites
2:02 Introduction to Volatility
3:31 Learning Resources
4:24 Practical Demo
4:32 What is Volatility?
7:49 Using MemLabs to Simulate a Crash/Compromise
10:05 Install Volatility
10:33 Transfer MemLabs Files to this System
11:39 Install and Extract the MemLabs File
12:15 Open the Dump in Volatility
15:37 Perform KDBG Scan
17:51 Extracting Information
19:29 Identify Hidden Processes
20:31 Investigate What a Process Was Doing
21:59 What Commands Were Being Executed?
23:38 Scan and Extract a File
30:01 Obtain Hashes with Volatility & CyberChef
31:52 Exploring Additional Modules
34:00 Conclusion
New to Cloud Computing? Get started here with a $100 credit → htt…...more
Memory Forensics with Volatility | HackerSploit Blue Team Series
360Likes
20,561Views
2023Mar 3
Volatility is an open source memory forensics framework for incident response and malware analysis. In this video, @HackerSploit will cover some examples of how to use Volatility in a Blue Team hacking scenario.
Chapters:
0:09 Introduction
1:11 What We Will Be Covering
1:43 Pre Requisites
2:02 Introduction to Volatility
3:31 Learning Resources
4:24 Practical Demo
4:32 What is Volatility?
7:49 Using MemLabs to Simulate a Crash/Compromise
10:05 Install Volatility
10:33 Transfer MemLabs Files to this System
11:39 Install and Extract the MemLabs File
12:15 Open the Dump in Volatility
15:37 Perform KDBG Scan
17:51 Extracting Information
19:29 Identify Hidden Processes
20:31 Investigate What a Process Was Doing
21:59 What Commands Were Being Executed?
23:38 Scan and Extract a File
30:01 Obtain Hashes with Volatility & CyberChef
31:52 Exploring Additional Modules
34:00 Conclusion
New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/linodetube
Check out the Volatility Github Repo → https://github.com/volatilityfoundati...
Learn more about MemLabs→ https://github.com/stuxnet999/MemLabs
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_co...#Hackersploit#BlueTeam#Volatility
Product: Cybersecurity, Volatility, hacking; @HackerSploit ;…...more