Summary
In this chapter, we discussed the importance of memory forensics in discovering malicious activities, briefly explained the memory structure, and went through volatility as one of the most-famous and effective memory forensics tools.
In the next chapter, we will be discussing the network forensics tools and techniques in order to extract evidential data from any network dump.