Volatility – Update All The Things
by Volatility | May 27, 2014 | artofmemoryforensics, contest, training, volatility
The Art of Memory Forensics Our book is cleared for release at the Blackhat USA conference this August. You can preorder hard copies and Kindle editions on Amazon now. Huge thanks to our publisher, Wiley, for allowing us to exceed 900 pages after we initially...Volatility Memory Forensics and Malware Analysis Training in Australia!
by Volatility | Apr 9, 2014 | forensics, malware, training, volatility, windows
We are happy to announce that our popular Memory Forensics and Malware Analysis Training course is going to be held in Canberra, Australia in August. This is our first offering in Australia, and we are already extremely excited to have a great training session full of...Building a Decoder for the CVE-2014-0502 Shellcode
by Volatility | Apr 8, 2014 | CVE-2014-0502, malware, volatility, windows
In late February of this year multiple security companies (FireEye, AlientVault, SecPod, Symantec, plus many more) were reporting on a Flash zero-day vulnerability (CVE-2014-0502) being exploited in the wild. Around this time a friend asked me if I...Training by The Volatility Project Now Available In Three Continents!
by Volatility | Feb 19, 2014 | training, volatility, windows
The Volatility Team is very happy to announce that we have a new website (http://www.memoryanalysis.net) and a number of upcoming training courses this year. With opportunities across three different continents, its now easier than ever before to learn about...ADD: The Next Big Threat To Memory Forensics….Or Not
by Volatility | Feb 3, 2014 | anti-forensics, kernel, malware, rootkits, volatility
Similar to a rootkit, an anti-forensics tool or technique must possess two critical traits in order to be significant: 1. It must do something 2. It must get away with it Satisfying #1 is the easy part. You can hide a process, hide a kernel module, or in the case of...
You must be logged in to post a comment.