Technical requirements
The examples and source code for this chapter are available in the GitHub repository at https://github.com/PacktPublishing/Mastering-Python-for-Networking-and-Security-Second-Edition.
This chapter requires the installation of specific tools for extracting data from different resources. You can use your operating system's package management tool to install them.
Here's a quick how-to guide on installing these tools in a Debian-based Linux operating system with the help of the following command:
$ sudo apt-get install volatility
Check out the following video to see the Code in Action: