#MemoryForensics

2025-03-28

The 2024 @volatility #PluginContest review is complete! We received 6 submissions from 6 countries for 7 #Volatility3 plugins, a Linux profile generation tool & 9 supporting utilities!

We are excited to announce that the @volatility #PluginContest First Place winner is:

Valentin Obst for btf2json

Read the full Contest Results:
volatilityfoundation.org/the-2

Congrats to all winners & thank you to all participants! 

#DFIR #memoryforensics

2025-03-21

Doing some interesting #memoryforensics on @signalapp tonight. Still would trust them with my life, and the lives of my friends, but interesting stuff in the memory.

For instance, people I haven't talked to in 3 years showed up in the memory dump with a field called "SharedGroupNames" that listed every group that both I and that individual were associated with.

Also, the "LastMessage" field was often populated with a plaintext version of the last thing the individual had messaged me.

Screenshot of a Debian Linux Memory Dump of the Signal Messenger Process. Included are fields like Sending users first, last name, shared group names, and last message in plaintext.
Volexity :verified:volexity@infosec.exchange
2025-02-26

@volexity Volcano Server & Volcano One v25.02.21 adds 300 new YARA rules; consistent Bash/ZSH history & sessions from Linux/macOS memory and files; and parses Linux systemd journals, macOS unified logs, and Windows USNs (search + timeline for all).

This release also extracts cmd history from Windows 24H2 RAM; and adds admin options for SAML and S3 bucket watching. 



For more information about Volcano Server & Volcano One, contact us: volexity.com/company/contact/

#dfir #memoryforensics #memoryanalysis

An image of the blue and orange Volexity Volcano logo with a New Release banner to announce the release of Volcano Server & Volcano One v25.02.21
Volexity :verified:volexity@infosec.exchange
2025-02-04

It’s great to see NCSC drawing attention to the ongoing issues with network devices & appliances. ncsc.gov.uk/news/cyber-agencie



Hopefully, vendors will heed the volatile data collection guidance: “Volatile data logging should support collection of… memory both at a kernel and individual process level.”

As reported in several of our recent blog posts, #memoryforensics of edge devices plays a critical role in helping to understand vulnerabilities and perform post-exploitation investigations: volexity.com/blog/tag/edge-dev



No ‘Ware To Hide!

#dfir

2025-01-30

Interested in searching for unknown malicious software? Our team in Microsoft Research is hiring. The position can be fully remote.

jobs.careers.microsoft.com/glo

#FediHire #MemoryForensics #ReverseEngineering

Volexity :verified:volexity@infosec.exchange
2025-01-28

On Thursday, Feb 6, @attrc will be at @WWHackinFest to present "Effectively Detecting Modern Code Injection Techniques with Volatility 3". See the full conference agenda here: wildwesthackinfest.com/wild-we. 

#dfir #memoryforensics #Volatility3 @volatility

2025-01-20

Detected a C2 framework in RAM today with velociraptor. Dumped the process memory with velo, created a zignature with radare2.

Never thought I'd ever reach that level...

Blogpost and velo artifact incoming :blobsmile:

#velociraptor #radare2 #detection #c2 #MemoryForensics #DFIR

2024-12-30

The 2024 @volatility #PluginContest ends tomorrow! Don't miss the chance to gain visibility for your work, contribute to an important open source project + win cash prizes! Submission details are here: volatilityfoundation.org/the-1

#dfir #memoryforensics

Tedi Heriyantotedi@infosec.exchange
2024-12-23

Memory Forensics Mastery:

- Understanding Memory & Basics of Memory Management: blog.threatbreach.io/posts/mem

- Acquisition of Memory Evidence: blog.threatbreach.io/posts/mem

#dfir #MemoryForensics

Tedi Heriyantotedi@infosec.exchange
2024-12-23
2024-12-10

We are excited to see submissions coming in for the 2024 @volatility #PluginContest! If you haven't submitted yours, don't wait—the contest closes on Dec 31. Gain visibility for your work, contribute to an important open source project + win cash prizes!

Contest details: Details here: volatilityfoundation.org/the-1

#dfir #memoryforensics

infosec.exchange/@volatility/1

Pen Test PartnersPTP@infosec.exchange
2024-10-31

Memory mounting with MemProcFS? This changes everything...

Our Luke Davis dives into MemProcFS in our latest blog, exploring how this tool has transformed memory forensics. MemProcFS allows memory dumps to be mounted and browsed like file systems, making complex memory structures easy to analyse. 💻

Using MemProcFS, investigators can:

Quickly analyse suspicious processes, like tracking Excel launching malicious code

Monitor network connections tied to ransomware groups and other threats

Explore advanced features like memory timelines and registry browsing to trace system activity and investigate security breaches 🔍

This post is a must-read for anyone delving into digital forensics or curious about memory mounting: 🔗pentestpartners.com/security-b

#MemoryForensics #MemProcFS #DigitalForensics #Cybersecurity #MalwareAnalysis #Infosec

Pen Test PartnersPTP@infosec.exchange
2024-10-24

In our latest blog, Luke Davis, Head of DFIR, explores the role of memory forensics in cyber investigations.🕵️‍♂️

Discover how analysing a system's RAM can uncover critical volatile data, such as running processes, encryption keys, network connections, and real-time user activity—evidence often missed by traditional disk forensics.
 
Learn how this approach helps detect malware, recover hidden data, and identify unauthorised access for a deeper understanding of cyber incidents.
 
👉 Read the full blog here: pentestpartners.com/security-b
 
🔜 Stay tuned for part two, where Luke dives into the innovative MemProcFS tool and how it revolutionises memory analysis.
 
#DFIR #MemoryForensics #DigitalForensics #CyberSecurity #IncidentResponse #ForensicTools #CyberInvestigations #InfoSec

Volexity :verified:volexity@infosec.exchange
2024-09-20

There are several opportunities coming up to hear some outstanding talks given by members of @volexity’s R&D and #threatintel teams! Here’s a list of who and where over the next few weeks:

September 24
Andrew Case will present “Defeating EDR Evading Malware with Memory Forensics” at Louisiana State University (linkedin.com/posts/andrewcase_)

October 1
Robert Jan Mora will present “Detecting Zero-Day Exploitation of Edge Devices” at ONE Conference (one-conference.nl/session/from)

October 3
Paul Rascagneres & Charles Gardner will co-present “The deck is stacked: analysis of OracleBamboo's SPYDEALER Android backdoor” at the Virus Bulletin Conference (virusbulletin.com/conference/v)

Andrew Case will present “Modern Memory Forensics with Volatility 3” at HTCIA Canada (htcia.org/2024-canada-cyber-in)

October 5
David McDonald will present “Hunting Fileless Malware with Tree-Sitter” at BSides Augusta (pretalx.com/bsidesaugusta-2024)

October 21
Andrew Case will present “Detecting & Defeating EDR-Evading Malware with Volatility 3” at From the Source, hosted by @volatility (volatilityfoundation.org/from-)

Tom Lancaster will present “It Has Been [0] Days Since the Last Edge-Device Security Incident” at From the Source, hosted by @volatility (volatilityfoundation.org/from-)

#dfir #memoryforensics

Volexity :verified:volexity@infosec.exchange
2024-09-18

@volexity Volcano Server & Volcano One v24.09.12 includes many new features:
 
• Adds 320 new YARA rules & IOCs for reverse shells on Linux
• Supports non-English unicode
• Extracts browser history from RAM
• Adds collected files into timelines & searches
• Parses IIS web logs, Linux syslogs, and Linux logon events
• Extends integration with MITRE ATT&CK + Splunk HEC
• Deploys collection tools to AWS EC2 and Azure VMs
• ...and much more!
 
For information about Volcano Server & Volcano One, contact us: volexity.com/company/contact/
 
#dfir #memoryforensics #memoryanalysis  

2024-08-28

Don't forget to post a photo of your own copy of The #ArtOfMemoryForensics and tag @volatility! The winner will be selected on August 31! #memoryforensics #dfir

infosec.exchange/@volatility/1

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst