Investigating Malware Using Memory Forensics - A Practical Approach

Investigating Malware Using Memory Forensics - A Practical Approach

Black Hat via YouTube Direct link

Monnappa KA • Info Security Investigator - Cisco CSIRT • Author of the Book: Learning Malware Analysis • Member of Black Hat Review Board • Co-founder Cysinfo Security Community • Creator of Limon Sa…

2 of 9

2 of 9

Monnappa KA • Info Security Investigator - Cisco CSIRT • Author of the Book: Learning Malware Analysis • Member of Black Hat Review Board • Co-founder Cysinfo Security Community • Creator of Limon Sa…

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Investigating Malware Using Memory Forensics - A Practical Approach

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Investigating Malware Using Memory Forensics - A Practical Approach
  2. 2 Monnappa KA • Info Security Investigator - Cisco CSIRT • Author of the Book: Learning Malware Analysis • Member of Black Hat Review Board • Co-founder Cysinfo Security Community • Creator of Limon Sa…
  3. 3 Memory Acquisition - Dumping the memory of a target machine to disk
  4. 4 Memory Analysis of Infected System (KeyBase Malware)
  5. 5 Memory Analysis of Infected System (Darkcomet RAT)
  6. 6 Investigating Hollow Process Injection
  7. 7 Investigating Rootkits
  8. 8 Memory Analysis of ZeroAccess Rootkit
  9. 9 Example - Memory Analysis of Necurs Rootkit

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.