All,
I recently wrote a blog post that outlines volatility usage related to an
intrusion based scenario. The blog post can be found here:
http://justanotherdfirblog.blogspot.com/2015/11/solving-binary-zone-forensi…
The challenge can be found here:
http://www.binary-zone.com/2015/09/16/digital-forensic-challenge-4/
Hopefully some of you will find it useful.
Best,
Jared