Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Mr Silverlight Drive-by Meet Volatility Timelines

$
0
0
I recently had the opportunity to attend the Volatility Windows Malware and Memory Forensics Training. Prior to the training, I used memory forensics (and thus Volatility) in different capacities but it wasn't a technique I leveraged when responding to security events and incidents during incident response activities. This was an area I wanted to improve upon going into the training. As the training went on and more material and labs were covered I kept thinking to myself how I intended to incorporate memory forensics into my response process. To use the technique when triaging live systems remotely over the network. The labs in the training provided numerous scenarios about using memory forensics on compromised systems but I wanted to further explore it with a simulated a security event. This post explores Volatility usage against an infected system's memory image by first determining: is the system infected and if so, how did it become infected in the first place.


more here...........http://journeyintoir.blogspot.com/2014/05/mr-silverlight-drive-by-meet-volatility.html

Viewing all articles
Browse latest Browse all 8064

Trending Articles