Malware and Memory Forensics Training Headed to Herndon and Amsterdam!
by Volatility | Feb 28, 2018 | artofmemoryforensics, forensics, training
After another highly successfully year of our Malware and Memory Forensics training, which included sold-out public trainings in Herndon, VA and London as well as several private trainings, we are excited to announce our lineup of public trainings for 2018. Our first...The (5th Annual) 2017 Volatility Plugin Contest is Live!
by Volatility | Apr 20, 2017 | contest, forensics, linux, macosx, volatility, volatility foundation
Its that time again, folks! The 2017 Volatility Plugin contest is now live and accepting submissions until October 1st, 2017. Winners of this year’s contest will be receiving over $2,250 in cash prizes as well as plenty of Volatility swag...Results from the 2016 Volatility Plugin Contest are in!
by Volatility | Dec 5, 2016 | contest, forensics, malware, volatility, volatility foundation
Congratulations to all the participants! This year we received more submissions than ever before (21 to be exact, from 16 different authors), so judging took longer than we expected. Sorry about that! The good news is…there’s a LOT of new and exciting...Results from the 2015 Volatility Plugin Contest are in!
by Volatility | Oct 29, 2015 | contest, forensics, linux, malware, volatility, volatility foundation, windows
The competition this year was fierce! We received 12 plugins to the contest. Similar to last year, ranking the submissions was one of the hardest things we’ve had to do. Each plugin is unique in its own way and introduces a capability to open source memory...Recovering TeamViewer (and other) Credentials from RAM with EditBox
by Volatility | Aug 1, 2015 | contest, forensics, passwords, volatility, windows
I recently stumbled upon the TeamViewer-dumper-in-CPP project, which shows just how easy it is to recover TeamViewer IDs, passwords, and account information from a running TV instance by enumerating child windows (on a live machine). The method is based on sending a...
You must be logged in to post a comment.