Posts Tagged ‘Volatility’

Most Recent
 
Read More
2019-02-21

Will WannaCry be back?

There was a rapid growth of encryption programs in 2017. The most striking attacks were WannaCry, exPetr and BadRabbit. The attacks were aimed at businesses, and cyber security experts are looking for a way to stop the spread of the virus. Experts say that WannaCry has not been destroyed yet.

59
 
Read More
2018-04-29

AXIOM V2: MEMORY FORENSICS

AXIOM is our one of the best tools. A few days ago Magnet Forensics has released AXIOM V2. Now AXIOM contains many features. We were especially delighted that the functional Volatility appeared in a new version of AXIOM. Volatility is the best tool for memory forensics. The combination of AXIOM and Volatility is clearly an excellent idea. And of course we immediately started testing this functionality.

614
 
Read More
2018-03-26

How to detect proxies and network traffic with Volatility

There are several options for how to solve the effect of an opaque proxy server on network connections. This blog is obsessed with how you can solve this problem by volatility and lines.

102
 
Read More
2017-12-31

Volatility plugin to extract BitLocker Full Volume Encryption Keys

Computer attacks constantly worry administrators and computer users. Earlier we already talked about volatility.

Plugin for the platform Volatility Framework, whose goal is to extract the encryption keys Full Volume Encryption Keys (FVEK) from memory. It works from Windows 7 to Windows 10. Unfortunately, the support for Windows 8 – 10 is very experimental, but it works in most cases with a few quirks.

520
Latest Headlines
 
Read More
170
 
Read More
111
 
Read More
349

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Chip-off Technique in Mobile Forensics