Investigating Malware Using Memory Forensics - A Practical Approach

  Рет қаралды 82,061

Black Hat

Black Hat

Күн бұрын

Пікірлер
@rehm3868
@rehm3868 3 жыл бұрын
You made memory forensics so easy to understand for a newbie like me. I’m now more interested in practicing forensics. Hats off to to you sir Monnappa!
@NeXuSInfoS3c
@NeXuSInfoS3c 4 жыл бұрын
you are a role model in cyber security sir.
@rhydhamjoshi1960
@rhydhamjoshi1960 4 жыл бұрын
One of the best presentations that I ever attended. I feel I learned at each and every second of the presentation. Very engaging talk. The experience and the expertise of Monnappa on Volatility framework is incredible. Great work. :)
@cmdsecure
@cmdsecure 2 жыл бұрын
By far, one of the best videos in terms of understanding the processes used and the different commands with Volatility. Will be watching again so I can practise on my own examples with Volatility3.
@jalapenohiway
@jalapenohiway 3 жыл бұрын
Amazing presentation with TONS of invaluable information, all in a very concise manner. TY!
@ihacksi
@ihacksi 11 ай бұрын
Best memory forensics presentation ever! Thank you sir!
@thecyberian9803
@thecyberian9803 4 жыл бұрын
Thank you very much Monnappa for this excellent presentation and perfect demonstration.
@kranky1993
@kranky1993 3 жыл бұрын
Danke für die Präsentation. Habe super viel gelernt was ich nun auf der Arbeit umsetzten kann ❤️
@vinnu333
@vinnu333 2 жыл бұрын
An Awesome tool for Memory Forensics and a very detailed presentation!! Glad this is an open-source tool.
@marcschweiz
@marcschweiz 3 жыл бұрын
This absolutely blew my mind. So detailed and well explained. Thank you Monnappa!
@MrEvoluter
@MrEvoluter 4 жыл бұрын
What a voice sir, it is so clear and your approach to each objective is definitely whelming. Thank you for such a great demonstration, felt like learnt and dealt with my investigation. Tahnk you once again.
@Madeinoz1967
@Madeinoz1967 3 жыл бұрын
Very detailed presentation. Thank you for sharing
@kidsfungaming6756
@kidsfungaming6756 Жыл бұрын
wow, extraordinary presentation, can I request to get the discussed memory dumps for practicing? please
@nilanjana25
@nilanjana25 2 жыл бұрын
This is an awesome informative presentation. Thank you 😊
@sarathreddy844
@sarathreddy844 4 жыл бұрын
Really very nice explanation..I am getting 60 %clarity on memory analysis
@sudipsinha1660
@sudipsinha1660 3 жыл бұрын
very nice.. thank you for delivering great talk.
@ibrahima9123
@ibrahima9123 4 жыл бұрын
Awesome and great explanation.
@anasshaikh5778
@anasshaikh5778 3 жыл бұрын
Thanks KZbin for recommending this video
@emran5897
@emran5897 5 жыл бұрын
I love to follow ur videos your videos teaches me a lot. Thank you so much.
@yogeshdange
@yogeshdange 3 жыл бұрын
Wow 👏 thank you so much for this session 🙌
@krithikapadmavathy7052
@krithikapadmavathy7052 3 жыл бұрын
Best learning session, thank you
@3RR0R-u4x
@3RR0R-u4x Жыл бұрын
Nice presentation.
@Basieeee
@Basieeee 4 жыл бұрын
Man thanks, I had to do incident response for my threat hunt class. I was so lost but this cleared up a bunch.
@SantoshKumar-bm2iz
@SantoshKumar-bm2iz 3 жыл бұрын
You are the best... 👍
@nunoalexandre6408
@nunoalexandre6408 2 жыл бұрын
Very Nice...
@nimaforoughi3008
@nimaforoughi3008 2 жыл бұрын
So beautiful!!!!
@rockrobotx
@rockrobotx 2 жыл бұрын
i really liked this presentation; very informative and, indeed, practical. I'm sure I'm not alone in my disappointment for what defcon and black hat have become. What's more; the infosec industry in the east seems much less superficial and sexy, which is why the best presentations come from people who live outside the US, Canada, Western Europe. Feels like that, anyway.
@msecure5543
@msecure5543 4 жыл бұрын
Please provide full video.. It's very useful
@IjonTichy-1000
@IjonTichy-1000 4 жыл бұрын
volatility rulez. This is all one may need for malware analysis.
@mohamedal-ghamdi7654
@mohamedal-ghamdi7654 3 жыл бұрын
Brilliant, nothing to say more
@clarencewilliams3065
@clarencewilliams3065 4 жыл бұрын
Good work Sir.
@alifayyaz851
@alifayyaz851 2 жыл бұрын
i tried to recover a packed malware from memory knowing its PID using procdump but it recovered me packed exe . Can't i recover it unpacked ?
@keitakeita7890
@keitakeita7890 3 жыл бұрын
I’m now more interested in practicing forensics, can you share the memory dump
@CyberDeck-pg7sf
@CyberDeck-pg7sf 9 ай бұрын
Is it possible to get the sample you are analyzing ?
@peacefultube45
@peacefultube45 5 жыл бұрын
Awesome book bro 💪👊👌 read it 😍🥰
@rahuldutt2021
@rahuldutt2021 2 жыл бұрын
Hi sir, I'm doing a project on "Primary Memory Analysis". I have a question how can I undergo the live memory forensic, in which computer system I need to undergo, can I do on my personal laptop and what are the programs I need to run or do I need to download memory dump from the Internet containing malware? Could you plz advice.
@mehervardhan2177
@mehervardhan2177 Ай бұрын
Can I get all the binary samples in a google drive>
@SarathKumariamawesome
@SarathKumariamawesome 5 жыл бұрын
Good one
@bubunleo
@bubunleo 5 жыл бұрын
awesome !!!!nice training
@New-qg3zj
@New-qg3zj 2 жыл бұрын
How to do analysis on infected Android mobile
@bsoujanya8380
@bsoujanya8380 3 жыл бұрын
how to do memory forensics in Routers
@hackingkingdom4061
@hackingkingdom4061 4 жыл бұрын
can u provide the file link
@valeenoi2284
@valeenoi2284 2 жыл бұрын
The dizzying array of tools and techniques... it's mindboggling. Don't we all agree that the root cause of all these issues is... Windows? Ditch that shit OS.
@sarathreddy844
@sarathreddy844 4 жыл бұрын
i want one sample .vmem file
@AlexSiviero
@AlexSiviero 4 жыл бұрын
Vmem is a memory dump from a VMware machine. Easiest and cleanest way to obtain it is to snapshot an infected VM and look for this file on the folder the VM is at. You can then run volatility on it without the need to converting it to a raw dump
@usuallyadam
@usuallyadam 3 жыл бұрын
Gulp!
@killshxxxt5147
@killshxxxt5147 4 жыл бұрын
nice very informative! could be alot better tho!
@andrevirgantara5360
@andrevirgantara5360 3 жыл бұрын
wkwkwk server C2 nya di undip
Practical Malware Analysis Essentials for Incident Responders
50:49
RSA Conference
Рет қаралды 152 М.
Is your PC hacked? RAM Forensics with Volatility
14:29
PC Security Channel
Рет қаралды 924 М.
Wireshark - Malware traffic Analysis
16:01
Hack eXPlorer
Рет қаралды 208 М.
License to Kill: Malware Hunting with the Sysinternals Tools
1:18:10
Mark Russinovich
Рет қаралды 97 М.
Deep Backdoors in Deep Reinforcement Learning Agents
30:48
Email Header Analysis and Forensic Investigation
22:59
13Cubed
Рет қаралды 154 М.
SANS DFIR Webcast - Memory Forensics for Incident Response
1:08:10
SANS Digital Forensics and Incident Response
Рет қаралды 54 М.
Hacking Windows TrustedInstaller (GOD MODE)
31:07
John Hammond
Рет қаралды 899 М.
Malware Hunting with Mark Russinovich and the Sysinternals Tools
1:26:37
Mark Russinovich
Рет қаралды 67 М.
AI Is Making You An Illiterate Programmer
27:22
ThePrimeTime
Рет қаралды 183 М.
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,6 МЛН