Completed
Monnappa KA • Info Security Investigator - Cisco CSIRT • Author of the Book: Learning Malware Analysis • Member of Black Hat Review Board • Co-founder Cysinfo Security Community • Creator of Limon Sa…
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Investigating Malware Using Memory Forensics - A Practical Approach
Automatically move to the next video in the Classroom when playback concludes
- 1 Investigating Malware Using Memory Forensics - A Practical Approach
- 2 Monnappa KA • Info Security Investigator - Cisco CSIRT • Author of the Book: Learning Malware Analysis • Member of Black Hat Review Board • Co-founder Cysinfo Security Community • Creator of Limon Sa…
- 3 Memory Acquisition - Dumping the memory of a target machine to disk
- 4 Memory Analysis of Infected System (KeyBase Malware)
- 5 Memory Analysis of Infected System (Darkcomet RAT)
- 6 Investigating Hollow Process Injection
- 7 Investigating Rootkits
- 8 Memory Analysis of ZeroAccess Rootkit
- 9 Example - Memory Analysis of Necurs Rootkit