Volatility 2.4 at Blackhat Arsenal – Reverse Engineering Rootkits

Published August 27, 2014

Michael Hale Ligh

This video demonstrates how you can leverage Volatility and memory forensics to detect kernel rootkits, assist with reverse engineering, and use the results for developing additional indicators.
The video is narrated by Apple’s text to speech and you can find the actual text on the Youtube page. The live/in-person demo was given at the @Toolswatch Blackhat Arsenal.