Summary
In this chapter, we looked at memory forensics and analysis using some of the many plugins available within the Volatility 3 framework. We were able to successfully perform process, registry, DLL, and even malware analysis using this versatile tool. As we’ve seen, Volatility can perform several important functions in DFIR analysis and should be used together with other tools we’ve used previously to perform in-depth and detailed forensic analyses and investigations.
Be sure to download more publicly available memory images and samples to test your skills in this area. Experiment with as many plugins as you can and, of course, be sure to document your findings and consider sharing them online.
Next up, we’ll be going even deeper into Volatility as we perform ransomware analysis and use many other tools to discover and analyze various DFIR artifacts. See you in the next chapter!