ADD: The Next Big Threat To Memory Forensics….Or Not
by Volatility | Feb 3, 2014 | anti-forensics, kernel, malware, rootkits, volatility
Similar to a rootkit, an anti-forensics tool or technique must possess two critical traits in order to be significant: 1. It must do something 2. It must get away with it Satisfying #1 is the easy part. You can hide a process, hide a kernel module, or in the case of...
You must be logged in to post a comment.