Volatility is an amazing tool with for memory analysis. If you don't have Sysmon, EDR or other related tools in your environment then you seriously need to get familiar with this tool. In this presentation I will go over getting the tool, OS Profiles/PDBs, supported formats, acquisition methods and capabilities. Then I will go over some of the techniques that I use, including Yara for identifying malware and anomalous behavior. Afterwards I will convey the beauty of the framework itself to show how to automate the processes of working with the memory images and enriching your data.
20 years of IT and Security experience in EDU, Healthcare, Hospitality and retail. I have been working Incident Response for several years now and want to share some of my experiences with using Volatility.
Recorded at NolaCon 2019
Back to NolaCon 2019 video list
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek