Volatility Updates Summer 2015
by Volatility | Aug 25, 2015 | arsenal, blackhat, linux, macosx, training, volatility foundation, windows
Summer 2015 has been quite a busy time for the memory forensics community. We wanted to write a quick update to talk about some recent events and research as well as upcoming news. Conferences Black Hat Vegas 2015 We wanted to again thank everyone who came out and...Windows Malware and Memory Forensics Training in the UK
by Volatility | Mar 16, 2015 | artofmemoryforensics, malware, training, volatility
Windows Malware and Memory Forensics Training by The Volatility Project is the only memory forensics course officially designed, sponsored, and taught by the Volatility developers. One of the main reasons we made Volatility open-source is to encourage and...Advice from Det. Michael Chaves on Memory Forensics, KnTDD, and POS Malware
by Volatility | Feb 2, 2015 | knttools, malware, pos, ram scaper, training, volatility
The following story was shared by Detective Michael Chaves. It describes how he’s used Volatility, KnTDD, and memory forensics over the past year to investigate POS breaches at local businesses. Kudos to Michael for applying his skills in an effective and...Acquiring Memor(ies) from 2014
by Volatility | Dec 31, 2014 | arsenal, artofmemoryforensics, blackhat, contest, forensics, knttools, omfw, training, truecrypt, volatility, volatility foundation
2014 is extremely volatile. Any minute now, it will be gone. Thus, we wanted to take a minute and preserve some of the more exciting memories. Specifically, we wanted to summarize how the memory forensics field and Volatility community has progressed this year....Announcing the 2014 Volatility Plugin Contest Results!
by Volatility | Oct 29, 2014 | contest, forensics, macosx, malware, rootkits, training, volatility, volatility foundation, windows
The competition this year was fierce! We received a total of nearly 30 plugins to the contest. Ranking the submissions was one of the hardest things we’ve had to do. Each plugin is unique in its own way and introduces a capability to open source memory forensics that...
You must be logged in to post a comment.