Building a Muscle Memory with Rekall Memory Forensic Framework

Building a Muscle Memory with Rekall Memory Forensic Framework

via YouTube Direct link

Process Enumeration pslist Using Volatility

10 of 24

10 of 24

Process Enumeration pslist Using Volatility

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Building a Muscle Memory with Rekall Memory Forensic Framework

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 You are Freaking Awesome!
  3. 3 Memory Forensics IRL
  4. 4 Evidence in Memory
  5. 5 Rekall Memory Forensic Framework
  6. 6 Investigative Methodology: Use Case: Identifying Malware
  7. 7 Interactive Rekall Session
  8. 8 Profile Auto-detection
  9. 9 Session Caching
  10. 10 Process Enumeration pslist Using Volatility
  11. 11 Process Enumeration with Rekall Choose Your Poison Rekall's PSList Methods of Enumeration
  12. 12 Process Scanning with Rekall Output Options
  13. 13 Advantages of Baselining: "Know Normal, Find Evil."
  14. 14 MBR Persistence
  15. 15 Memory Analysis with Rekall Step 1: Identify Roque Processes
  16. 16 Know Normal (Windows Processes), Find Evil
  17. 17 Step 3: Network Connections
  18. 18 Signs of Code Injection
  19. 19 Detect Rootkit Behaviors
  20. 20 Memory Analysis with Rekall Step 6: Acquisition of Notable Findings
  21. 21 AFF4 Volume Format
  22. 22 Live Analysis with Rekall (1)
  23. 23 Live Analysis with Rekall (3) Acquisition
  24. 24 References

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.