All,

I recently wrote a blog post that outlines volatility usage related to an intrusion based scenario. The blog post can be found here:

http://justanotherdfirblog.blogspot.com/2015/11/solving-binary-zone-forensic-challenge-4.html

The challenge can be found here: http://www.binary-zone.com/2015/09/16/digital-forensic-challenge-4/

Hopefully some of you will find it useful.

Best,
Jared