June 2016
Beginner to intermediate
322 pages
6h 18m
English
In this chapter, we discussed the importance of memory forensics in discovering malicious activities, briefly explained the memory structure, and went through volatility as one of the most-famous and effective memory forensics tools.
In the next chapter, we will be discussing the network forensics tools and techniques in order to extract evidential data from any network dump.