Skip to main content

Memory Forensics

Advanced Memory Forensics - Detecting Code Injection Techniques in Linux

··1852 words·9 mins· loading · loading
Advanced memory forensics equips red teams and pen testers with the skills to detect and analyze sophisticated code injection techniques in Linux, using tools like Volatility and GDB to uncover hidden malicious activities and defend against advanced threats.

Advanced Memory Forensics: Analysis Techniques

··6630 words·32 mins· loading · loading
This article explores advanced memory forensics techniques for detecting malicious activity in memory, including process timelining, high-low level analysis, walking the VAD tree, and detecting rogue processes, kernel-level rootkits, DLL hijacking, process hollowing, and sophisticated persistence mechanisms.

Dynamic Techniques for Advanced Malware Analysis

··2231 words·11 mins· loading · loading
This article discusses advanced malware analysis techniques focusing on dynamic analysis and provides real-world examples and code samples for techniques such as memory analysis, network monitoring, and debugging.

Anti-Forensics: Knowing What They See (Memory Analysis)

··587 words·3 mins· loading · loading
To hide in memory, you must study memory. This guide flips the script on forensics, using Volatility to understand how Blue Teams hunt for your beacons.