top of page
Search


Windows Memory & Network Analysis: Volatility3 Walkthrough
A hands-on walkthrough of Windows memory and network forensics using Volatility 3. This analysis uncovers active network connections, process injection, and Meterpreter activity directly from RAM — demonstrating how memory artifacts reveal attacker behavior even after system cleanup. Learn how to trace reverse shells, detect in-memory payloads, and link processes to C2 activity with real forensic evidence.

DFIRHive
Oct 117 min read


Windows Memory Forensics: Reconstructing User Activity with Volatility3
A hands-on walkthrough of memory forensics using Volatility3 — uncovering user activity, session data, and interactive evidence hidden within a Windows memory image. Learn how investigators trace what the user did, not just what ran.

DFIRHive
Oct 98 min read


Windows Memory and Process Analysis: Volatility3 Walkthrough
A step-by-step forensic walkthrough using Volatility 3 to investigate a suspicious memory image from MemLabs Lab 5. This analysis uncovers hidden processes, password-protected archives, and encoded artifacts, showing how volatile memory can reveal evidence long after files have vanished from disk.

DFIRHive
Oct 69 min read


Volatility: A Beginner’s Guide to Memory Analysis
Volatility is one of the most powerful tools in digital forensics, allowing investigators to extract and analyze artifacts directly from memory (RAM). In this beginner-friendly guide, we walk through installing Volatility, preparing memory dumps, and using essential plugins to uncover hidden processes, suspicious DLLs, network activity, and even malware injections.

DFIRHive
Sep 306 min read


From RAM to Evidence (Part 1): Capturing Volatile Memory on Windows
Memory forensics begins with acquisition. In this first part of our series, we walk through capturing volatile memory on Windows using FTK Imager, ProcDump, and crash dumps. Learn how to choose the right dump type, preserve evidence integrity with hashing, and apply best practices for real-world investigations.

DFIRHive
Sep 266 min read


A Guide to KAPE: Streamlining Windows Forensics
In digital forensics, every minute counts. Imaging an entire disk is thorough but painfully slow, while manual collection is precise but inefficient. KAPE bridges the gap — portable, fast, and designed to give investigators early leads without the wait.

DFIRHive
Sep 207 min read
bottom of page
