• GitHub
  • Contact
The Volatility Foundation - Promoting Accessible Memory Analysis Tools Within the Memory Forensics Community
  • The Volatility Framework
  • Training
  • Events
  • FAQ
  • Contest
  • About
  • Blog
Select Page

OMFW 2012: Analyzing Linux Kernel Rootkits with Volatility

by Volatility | Oct 12, 2012 | kernel, linux, malware, omfw, volatility

This presentation went over a number of the new Linux plugins and showed how to use them when investigating Linux kernel rootkits. All of the plugins and functionality shown is part of the 2.2 Volatility release. Author/Presenter: Andrew Case / @attrc  Direct Link:...

Solving the GrrCon Network Forensics Challenge with Volatility

by Volatility | Oct 11, 2012 | forensics, grrcon, malware, volatility, windows

In this post, we will walk through the process that MHL (@iMHLv2) and I (@attrc) went through to solve the @GrrCon network forensics challenge. Although participants were provided a memory sample, packet capture, and file system timeline, as a personal challenge our...

Phalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkit

by Volatility | Oct 10, 2012 | kernel, malware, movp, volatility

Month of Volatility Plugins In this blog post I will analyze the Phalanax2 rootkit using both Volatility as well as traditional malware analysis techniques. Phalanx2 Phalanx2 (P2) is the latest version of a private rootkit, whose original source was leaked to...

OMFW 2012: Reconstructing the MBR and MFT from Memory

by Jamie Levy | Oct 9, 2012 | forensics, omfw, volatility, windows

This presentation introduced two new Volatility plugins: mbrparser and mftparser which will be released in Volatility 2.3.  These plugins empower the investigator to explore possible MBR infections or in the case of mftparser, files that are in use on the system....

OMFW 2012: Malware In the Windows GUI Subsystem

by Volatility | Oct 8, 2012 | forensics, kernel, malware, omfw, volatility, windows

This presentation introduced Volatility’s new win32k suite – a set of plugins and APIs that make it possible to perform malware analysis and memory forensics based on artifacts in the Windows GUI subsystem. This subsystem plays a part in nearly everything...
« Older Entries
Next Entries »

Volatility Blog Archive

2025

  • + July (1)
  • + May (2)
  • + March (1)

2024

  • + August (1)
  • + July (1)
  • + March (1)

2023

  • + August (1)
  • + July (1)
  • + June (1)
  • + March (1)
  • + February (1)
  • + January (1)

2022

  • + July (1)
  • + February (1)
  • + January (1)

2021

  • + October (1)
  • + August (1)
  • + May (1)
  • + January (1)

2020

  • + November (1)
  • + May (2)

2019

  • + November (1)
  • + October (2)
  • + July (1)
  • + June (1)

2018

  • + November (2)
  • + May (1)
  • + February (1)

2017

  • + November (1)
  • + June (1)
  • + April (1)

2016

  • + December (2)
  • + September (1)
  • + August (2)
  • + July (1)
  • + April (3)

2015

  • + November (2)
  • + October (1)
  • + August (2)
  • + July (2)
  • + June (1)
  • + May (1)
  • + March (1)
  • + February (1)
  • + January (1)

2014

  • + December (1)
  • + October (3)
  • + September (5)
  • + August (6)
  • + July (2)
  • + May (1)
  • + April (2)
  • + February (2)
  • + January (5)

2013

  • + October (3)
  • + September (2)
  • + August (1)
  • + June (9)
  • + May (15)
  • + April (2)
  • + March (2)
  • + February (1)
  • + January (4)

2012

  • + December (2)
  • + November (1)
  • + October (14)
  • + September (19)
bluesky logo
    bluesky logo
    bluesky logo
    bluesky logo
    bluesky logo

    All Content © The Volatility Foundation, a 501(c)(3) Nonprofit Organization.

    All Content © The Volatility Foundation, a 501(c)(3) Nonprofit Organization.

     

    Loading Comments...
     

    You must be logged in to post a comment.