Главная
Study mode:
on
1
Introduction
2
About Jamie
3
Background
4
dll loading
5
Code injection
6
Shell code injection
7
Page permissions
8
Remote library injections
9
How to find remote library injections
10
Virtual Address Descriptor Tree
11
Reflective dll Loading
12
Memory Segments
13
Bad Tree
14
Memory
15
Demo
16
Memory Module
17
Memory Sample
18
How to Start
19
Timeline
20
Registry Key
21
Conclusion
Description:
Explore advanced memory forensics techniques in this 31-minute conference talk from OSDFCon 2021. Discover how to effectively analyze volatile memory samples, uncover various attack methodologies, and learn practical investigation steps. Delve into topics such as dll loading, code injection, shell code injection, page permissions, and remote library injections. Follow along with a live demo showcasing memory analysis techniques, including the use of Virtual Address Descriptor Trees and Memory Modules. Gain insights from Jamie Levy, a senior researcher and developer with extensive experience in digital forensics, as she emphasizes the critical role of volatile memory in investigations and provides valuable tools for future analyses.

Leaving No Stone Unturned

BasisTech
Add to list
0:00 / 0:00