Jump to content
Nytro

Public Replay: THA Deep Dive – Analyzing Malware in Memory

Recommended Posts

[h=1]Public Replay: THA Deep Dive – Analyzing Malware in Memory[/h]December 31, 2012

On Monday December 18, 2012 we had our first THA Deep Dive Webinar. Andrew Case, THA instructor and Volatility core developer, discussed Analyzing Malware in Memory.

Andrew went over many topics, starting with what memory forensics actually is, and the differences between memory and live forensics. He then went on to discuss Volatility, a framework for the extraction of digital artifacts from volatile memory (RAM) samples.

Detailed information about Volatility covered the following areas:

Overview

Per-Process Analysis

API hooking

Misc. Process Data

GUI Subsystem

Registry in Memory

Callbacks

IRP Hooking

Devices

MBR & MFT

The session wrapped up with suggested resources for further reading, as well as reference links in the slides.

There were some audio issues during the presentation, so as you watch the video, know that it isn’t your computer! The slides are available for download here.

Please feel free to contact us if you have any questions!

Download slides:

www.thehackeracademy.com/wp-content/uploads/2012/12/THA-Deep-Dive-Analyzing-Malware-in-Memory.pdf

Prezentare:

https://www.thehackeracademy.com/public-replay-tha-deep-dive-analyzing-malware-in-memory/

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...