Slides and Video of Analyzing Malware in Memory Webinar
by Volatility | Jan 4, 2013 | code injection, forensics, kernel, malware, volatility, windows
I recently presented a Hacker Academy Deep Dive ( X thehackeracademy.com/tha-deep-dive-analyzing-malware-in-memory/) webinar on ‘Analyzing Malware in Memory’. The purpose of this presentation was to show how in-depth malware analysis can performed on...OMFW 2012: Mining the PFN Database for Malware Artifacts
by Volatility | Oct 19, 2012 | forensics, kernel, knttools, malware, omfw, windows
There are few people in the world who know more about physical memory acquisition and analysis than Mr. Garner; President of GMG Systems, Inc. and author of ( X http://www.gmgsystemsinc.com/knttools/) KnTTools. At a rare conference appearance, George discussed how he...OMFW 2012: Datalore: Android Memory Analysis
by Volatility | Oct 12, 2012 | android, forensics, kernel, linux, omfw, volatility
This presentation went over the Android specific analysis capabilities of Volatility as well as showed how to use LiME to capture physical memory from Android devices. This functionality will be included in the 2.3 Volatility release. Author/Presenter: Joe Sylve /...OMFW 2012: Analyzing Linux Kernel Rootkits with Volatility
by Volatility | Oct 12, 2012 | kernel, linux, malware, omfw, volatility
This presentation went over a number of the new Linux plugins and showed how to use them when investigating Linux kernel rootkits. All of the plugins and functionality shown is part of the 2.2 Volatility release. Author/Presenter: Andrew Case / @attrc Direct Link:...Phalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkit
by Volatility | Oct 10, 2012 | kernel, malware, movp, volatility
Month of Volatility Plugins In this blog post I will analyze the Phalanax2 rootkit using both Volatility as well as traditional malware analysis techniques. Phalanx2 Phalanx2 (P2) is the latest version of a private rootkit, whose original source was leaked to...
You must be logged in to post a comment.