· @twitter
1 followers · 56485 posts · Server mstdn.skullb0x.io

Originally posted by DEF CON / @defcon@twitter.com: twitter.com/gleeda/status/1663

RT by @defcon: I am happy to announce that I will be giving a training at @defcon this summer on Windows Memory Forensics!

#DFIR #memoryforensics

Last updated 1 year ago

"Some experiments with Process Hollowing" by Frank Block

Process Hollowing is a technique used by various malware families (such as FormBook, TrickBot and Agent Tesla) to hide their malicious code within a benign appearing process. The typical workflow for setting up such a hollowed process is as follows: Create a new process (victim) using a benign executable, in suspended state. Unmap the executabl…

, , , ,

insinuator.net/2022/09/some-ex

#Breaking #incidentanalysis #injection #malware #memoryforensics

Last updated 2 years ago

tXambe · @tXambe
1 followers · 323 posts · Server mastodon.social

RT @volatility@twitter.com

The 10th annual @volatility@twitter.com is officially OPEN! Gain visibility for your work and have a chance to win cash prizes! Submission deadline: 31 December 2022. Read the contest announcement here: volatility-labs.blogspot.com/2

🐦🔗: twitter.com/volatility/status/

#PluginContest #dfir #memoryforensics

Last updated 2 years ago

"Release of PTE Analysis plugins for Volatility 3" by Frank Block

I’m happy to announce the release of several plugins for Volatility 3 that allow you to dig deeper into the memory analysis. One of those plugins is PteMalfind, which is essentially an improved version of malfind. Another one is PteResolve which, similarly to the WinDBG command !pte, allows you to inspect Page Table Entry (PTE) […]…

, , , ,

insinuator.net/2021/12/release

#Building #forensics #malware #memoryforensics #windows

Last updated 3 years ago