

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Memory Acquisition, Alternate Memory Locations, Registry Analysis Plugins, Identify Rogue Processes, Check for Signs of a Rootkit
Typology: Cheat Sheet
1 / 2
This page cannot be seen from the preview
Don't miss anything!
This cheat sheet supports the SANS FOR 508 Advanced Digital Forensics, Incident Response, and Threat Hunting & SANS FOR526 Memory Forensics In- Depth courses. It is not intended to be an exhaustive resource for Volatility⢠or other highlighted tools. Volatility⢠is a trademark of Verizon. The SANS Institute is not sponsored, approved by or affiliated with Verizon.
--output-file Optional file to write output --output=body Bodyfile format (also text,xlsx) --type=Registry Extract registry key last write times
--output=body --profile=Win10x Memory Artifact Timelining Purpose How To Use This Document
Remember to open command prompt as Administrator winpmem
C:> DumpIt.exe /f F:\mem.raw /s 1 Memory Acquisition
Alternate Memory Locations
ā Microsoft\Windows\CurrentVersion\Run ā
Registry Analysis Plugins Converting Hibernation Files and Crash Dumps
--profile=Win7SP1x
- - profile=Win2016x64_
Extract Processes, Drivers, and Objects
Identify Rogue Processes
Check for Signs of a Rootkit
Review Network Artifacts
Analyze Process DLLs and Handles
Look for Evidence of Code Injection Getting Help
Sample Command Line
Identify System Profile
Using Environment Variables
Getting Started with Volatilityā¢