📘
CAS Cybersecurity
CtrlK
  • Start
  • Reconnaissance
  • Docker basics and Images
  • Scanning and Enumeration
  • Vulnerability Scanning and Analysis
  • Exploitation
  • Man in the Middle
  • Windows Hacking
  • Web Application Security
  • CTF and Crypto Exercises
  • Threat Intelligence
  • Forensic Exercises
    • Disk Forensics
    • Windows Forensics
    • Memory Forensics
      • Volatility2 Basics (Linux)
      • Volatility2 Exercise 1
      • Volatility3 Exercise 1
      • Volatility3 Exercise 2
      • Volatility3 Exercise 3
    • Image Forensics
    • Browser Forensics
    • Mail Header Analysis
    • Timestomping Exercise
    • Network Forensics
  • Malware Analysis
  • Android Malware
  • Forensic Readiness
  • Live Response
Powered by GitBook
On this page
  • Exercises
  • Similar Exercises

Was this helpful?

  1. Forensic Exercises

Memory Forensics

Exercises

  • Volatility Basics (Linux dump)

  • Volatility Exercise 1 (Windows dump)

  • Volatility3 Exercise 1 (Windows dump)

  • Volatility3 Exercise 2

  • Volatility3 Exercise 3

Similar Exercises

  • Memory dump analysis (YARA)

  • Velociraptor Volatility analysis

PreviousAlternate DatastreamsNextVolatility2 Basics (Linux)

Last updated 3 years ago

Was this helpful?