Volatility 2.4 at Blackhat Arsenal – Defeating Truecrypt Disk Encryption
by Volatility | Sep 4, 2014 | arsenal, blackhat, forensics, truecrypt, volatility, win8
This video shows how to use Volatility’s new Truecrypt plugins to defeat disk encryption on suspect computers running 64-bit Windows 8 and server 2012. The video is narrated by Apple’s text to speech and you can find the actual text on the Youtube page. The...Presenting Volatility Foundation Volatility Framework 2.4
by Volatility | Aug 13, 2014 | artofmemoryforensics, blackhat, kernel, linux, macosx, malware, truecrypt, volatility, win8
The release of this new Volatility version coincides with the publication of The Art of Memory Forensics. It adds support for Windows 8, 8.1, 2012, and 2012 R2 memory dumps, Mac OS X Mavericks (up to 10.9.4), and Linux kernels up to 3.16. New plugins include the...Volatility at Black Hat USA & DFRWS 2014
by Volatility | Jul 7, 2014 | artofmemoryforensics, blackhat, forensics, truecrypt, volatility, win8
Due to another year of open research and giving back to the open source community, Volatility will have a strong presence at both Black Hat USA and DFRWS 2014. This includes presentations, a book signing, and even a party! At Black Hat, the core Volatility Developers...TrueCrypt Master Key Extraction And Volume Identification
by Volatility | Jan 14, 2014 | forensics, training, truecrypt, volatility, win8
One of the disclosed pitfalls of TrueCrypt disk encryption is that the master keys must remain in RAM in order to provide fully transparent encryption. In other words, if master keys were allowed to be flushed to disk, the design would suffer in terms of security...
You must be logged in to post a comment.