To access material, start machines and answer questions login.
This room continues the memory investigation from the previous analysis. This is the last room out of 3, and we will be focusing on how network activity and post-exploitation behavior are captured in . We’ll examine artifacts from a live attack involving advance payloads like , suspicious child processes, and unusual outbound connections. All analyses will be performed using Volatility 3 and hands-on techniques applied directly to the memory dump.
We’ll walk through real indicators tied to remote shells, via startup folder abuse, and malware attempting outbound communications. Users will use memory structures, plugin outputs, and process inspection to track network behavior step by step.
Learning Objectives
- Identify network connections in a memory dump.
- Identify suspicious ports and remote endpoints.
- Link connections to processes.
- Detect reverse shells and memory injections in a memory dump.
- Trace and activity in memory.
Prerequisites
Click to continue to the room.
Ready to learn Cyber Security?
The Windows Memory & Network room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in