Memory forensics analyzes RAM dumps to find running processes, open network connections, typed commands, passwords, and malware. RAM contains volatile data that disappears on shutdown - it's a goldmine of forensic evidence!
Memory forensics is advanced but incredibly powerful. You can find encryption keys, running malware, and data that never touched disk! Volatility is the industry-standard tool.
Volatility Framework
Vol2 vs Vol3
Volatility 3 has better Windows 10 support and doesn't need profiles. Volatility 2 has more community plugins. Know both!
Identifying the Profile
Process Analysis
Network Connections
File Analysis
Registry Analysis
Credential Extraction
Finding credentials in memory dumps is extremely common in CTFs. Always run hashdump and check for plaintext passwords!
Strings and Grep
Memory Forensics Checklist
Knowledge Check
Key Takeaways
- Volatility 3 is preferred (Python 3, auto-profiles)
- Quick win: strings + grep before running plugins
- Always check: pslist, cmdline, netscan, hashdump
- Dump files and check for credentials
- Memory contains data that never touched disk
- Process trees reveal malicious parent-child relationships