Memory Forensics Using the Volatility Framework

Поделиться
HTML-код
  • Опубликовано: 14 дек 2024

Комментарии • 13

  • @jibunorufoegbune9567
    @jibunorufoegbune9567 2 года назад +2

    Thank you, Professor K, for this wonderful class you have rendered.

  • @richardatkins5249
    @richardatkins5249 3 года назад +2

    Thank you for creating this demo on using Volatility. The 18 minute exercise is a nice bite-sized example that is explained clearly both in voice and with screen depictions : )

  • @MD-tr6sh
    @MD-tr6sh 3 года назад

    Prof K, this has been an absolute wonder of a video. I am currently studying Cybersecurity and we are going over Forensics, I came across Volatility and well this video ties it together. Thank you for doing this for those of us that are learning the tool.

    • @krah8052
      @krah8052  3 года назад +1

      Glad it helped!

  • @garzaguitar
    @garzaguitar Год назад

    Amazing walk through!!! Thank you so much!

  • @deeptiprajapati2518
    @deeptiprajapati2518 2 года назад +1

    Amazing!
    I am preparing for a CTF event and this is so helpful, thank you professor!

  • @comrade_dankbob6876
    @comrade_dankbob6876 5 месяцев назад +2

    Super Skibidi Professor K

  • @citycen01
    @citycen01 Год назад +1

    This was amazing, thank you.

  • @chelseacoughlin5989
    @chelseacoughlin5989 Год назад +1

    THANK YOU!

  • @nimaforoughi3008
    @nimaforoughi3008 2 года назад +1

    Thanks Professor, Can you please add the commands in the description?

    • @narendrasurana8607
      @narendrasurana8607 2 года назад

      volatility.exe sample.raw imageinfo
      volatility.exe sample.raw --profile=win7SP1x64 pslist
      volatility.exe sample.raw --profile=win7SP1x64 pstree
      volatility.exe sample.raw --profile=win7SP1x64 cmdscan
      volatility.exe sample.raw --profile=win7SP1x64 hivelist
      volatility.exe sample.raw --profile=win7SP1x64 print key -K “Software\Microsoft\Windows\CurrentVersion\Run”
      volatility.exe sample.raw --profile=win7SP1x64 cmdline
      volatility.exe sample.raw --profile=win7SP1x64 procdump -p -dump-dir .
      strings .dmp | grep -Fi “” -C 5
      strings .dmp | grep -Fi “svchost.exe”
      strings .dmp | less

  • @sergioblanco6321
    @sergioblanco6321 Месяц назад

    Im gonna kiss you.
    . Been stuck on this ❤❤❤❤❤❤