Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Sdf: Memory Forensics 2

Posted By: ELK1nG
Sdf: Memory Forensics 2

Sdf: Memory Forensics 2
Last updated 7/2019
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.66 GB | Duration: 2h 15m

Learn Windows memory forensics

What you'll learn

Learn how to use Volatility

Learn to do a fast-triage malware compromise assessment

Understand plugin output for investigations

Learn a valuable triage methodology

Learn how to create a Volatility script

Requirements

Students need PC, Mac or Linux system (virtual machine preferred)

Willingness to learn!

Description

Learn to script Volatility and conduct a malware compromise assessment.This class provides you with hands on training working with a memory image in order to find evidence of compromise. Step-by-step the course teaches students how to automate memory forensic processing as well as how to interpret the findings. By the end of the course students will have an efficient forensic tool and methodology that may be used for any windows memory forensic exam. This class teaches students how to conduct memory forensics using Volatility.Learn how to use & combine plugin results to identify malwareLearn how to create a script to automate running plugins and post-processing data refinementLearn how to run and interpret pluginsHands-on practicals reinforce learningLearn all of this in about one hour using all freely available tools.

Overview

Section 1: Introduction

Lecture 1 Welcome to Memory Forensics 2

Lecture 2 Class outline

Lecture 3 Class setup

Lecture 4 Setup information

Lecture 5 Script editors

Lecture 6 Class downloads

Lecture 7 Class Github

Section 2: Finding malware processes

Lecture 8 Section Intro

Lecture 9 Script Demo

Lecture 10 Volatility script setup

Lecture 11 Automating Imagescan

Lecture 12 Automating pslist & psscan

Lecture 13 LSAISO.EXE

Lecture 14 Automating pstree

Lecture 15 Automating psxview

Lecture 16 Auto process psxview results

Lecture 17 Examining psscan results

Lecture 18 Psscan cross comparison triage

Lecture 19 Auto process pslist results

Lecture 20 Taskhost Triage

Lecture 21 Pstree results

Lecture 22 Section wrap-up

Section 3: Finding malware loaded in memory

Lecture 23 Section introduction

Lecture 24 Automating malfind

Lecture 25 Auto detect shellcode

Lecture 26 Automating moddump

Lecture 27 Automating DLLdump

Lecture 28 Auto malware scan

Lecture 29 Auto hashing

Lecture 30 Section wrap up

Section 4: Finding malware through other artifacts

Lecture 31 Section Introduction

Lecture 32 Auto process Dlllist results

Lecture 33 Shimcache

Lecture 34 Auto process MFT results

Lecture 35 Section wrap-up

Section 5: Conclusion

Lecture 36 Make the script executable

Lecture 37 Test run

Lecture 38 Conclusion

Lecture 39 Thank you!

Computer Forensic Examiners,IT professionals,Students,Computer crime investigators,Security analysts,Incident Response Analysts