windows Memory Forensics
windows Memory forensics plays a vital role in incident response and digital forensics. Here are the primary purposes and benefits
Detection of Malicious Activities:
Process Analysis
DLL & Handle Analysis
File & Registry Analysis
Network Analysis
User & Session Information
Memory Dumps
Module & Driver Analysis
Malware & Anomaly Detection
Miscellaneous
Memory Dumping & Extraction
Memory Artifacts
Event Log Extraction
Lateral Movement Detection
Registry-based Persistence Detection
Timeline Creation
IN this section , I am going to talk about Linux Memory Forensics with Volatility 3
Analyze the Memory Dump
python3 vol.py -f <memory_dump> <plugin_name> [options]
-f <memory_dump>: Path to the memory dump file.<plugin_name>: Volatility 3 plugin to use--pid <process_id># optional
1.Process Analysis
2.DLL & Handle Analysis
3.File & Registry Analysis
4.Network Analysis connections
5.User & Session Information
6.Memory Dumps
7.Module & Driver Analysis
8.Malware & Anomaly Detection
9.Miscellaneous
10.Memory Dumping & Extraction
11.Memory Artifacts
Extracting Event Logs:
Detecting Lateral Movement:
Registry-based persistence:
Create a Timeline:
Last updated