• The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

( Review 64 )
Read Online Download Now

The book will teach memory forensics starting with the introductory concepts and moving toward the advanced, most technical aspects. The flow of the manuscript will be based on a 5-day training course that the authors have executed in front of hundreds of students.

This book will provide the necessary foundation for performing volatile memory analysis, demonstrating how it can be used to dramatically improve digital investigation process, and relating how memory analysis can help address many of the challenges currently facing digital investigators. All this using open source, free tools.Readers will learn how to acquire memory from suspect systems in the most forensically sound manner possibleReaders will learn the investigative steps to determine if a machine is infected with malware, if it was used in furtherance of a crime (i.e. as a proxy to an attack), if it is the victim of an external data exfiltration, and so on.Readers will follow along with hands-on experiments and gain real-world experience with the concepts described in the manuscript.The book will not only cover the most heavily targeted operating system (Windows), but will expand to include Linux and Mac OSX.There will be an abundance of programs, code, sample memory dumps, and other supporting evidence files for hands-on activities available for download.There will also be instructor's materials: PowerPoint slides, course syllabus, and a test bank.There will be more than 30 exercises requiring evidence files, memory samples, and malware samples

Book Description

The book will teach memory forensics starting with the introductory concepts and moving toward the advanced, most technical aspects. The flow of the manuscript will be based on a 5-day training course that the authors have executed in front of hundreds of students.

This book will provide the necessary foundation for performing volatile memory analysis, demonstrating how it can be used to dramatically improve digital investigation process, and relating how memory analysis can help address many of the challenges currently facing digital investigators. All this using open source, free tools.Readers will learn how to acquire memory from suspect systems in the most forensically sound manner possibleReaders will learn the investigative steps to determine if a machine is infected with malware, if it was used in furtherance of a crime (i.e. as a proxy to an attack), if it is the victim of an external data exfiltration, and so on.Readers will follow along with hands-on experiments and gain real-world experience with the concepts described in the manuscript.The book will not only cover the most heavily targeted operating system (Windows), but will expand to include Linux and Mac OSX.There will be an abundance of programs, code, sample memory dumps, and other supporting evidence files for hands-on activities available for download.There will also be instructor's materials: PowerPoint slides, course syllabus, and a test bank.There will be more than 30 exercises requiring evidence files, memory samples, and malware samples

Book Detail

  • Book Title

    The Art of Memory Forensics: Detecting Malware ...

  • Author

    Michael Hale Ligh, Jamie Levy, Aaron Walters, Andrew Case

  • Book Type

    Business And Accounts

  • Date Published

    ,

  • Specification

    Management And Technology

  • Pages

    Pages

Read Online Download Now

Book Reviews

  • Mark Smith

    Donec ullamcorper vulputate quam pharetra tempus. Nam mi eros, porta vitae tempus sit amet, blandit non elit. Cras aliquet massa non quam molestie facilisis. Duis sollicitudin mattis ante, sed suscipit mi blandit et.

    Like Reply
  • cone adresson

    Nam ut egestas nibh. Phasellus sollicitudin tempus neque quis gravida. Aenean a eros at ex pharetra suscipit. Proin iaculis ipsum ac ullamcorper pretium. Morbi ut leo eu felis commodo porta.

    Like Reply
  • jessy_arthur

    Donec ullamcorper vulputate quam pharetra tempus. Nam mi eros, porta vitae tempus sit amet, blandit non elit. Cras aliquet massa non quam molestie facilisis. Duis sollicitudin mattis ante, sed suscipit mi blandit et.

    Like Reply
  • sarena doe

    Nam ut egestas nibh. Phasellus sollicitudin tempus neque quis gravida. Aenean a eros at ex pharetra suscipit. Proin iaculis ipsum ac ullamcorper pretium. Morbi ut leo eu felis commodo porta.

    Like Reply

LEAVE A REPLY

Related books

Members Online