This whitepaper is a guide to performing memory forensics using volatility. It goes into depth on using the Volatility framework to analyze memory dumped from a live system.
You can download it from the following link: https://packetstormsecurity.com/files/download/161577/Memory_Forensics.pdf
Source: https://packetstormsecurity.com/files/161577/Memory-Forensics-Using-Volatility.html

