Volatility Memory Forensics and Malware Analysis Training in Australia!
by Volatility | Apr 9, 2014 | forensics, malware, training, volatility, windows
We are happy to announce that our popular Memory Forensics and Malware Analysis Training course is going to be held in Canberra, Australia in August. This is our first offering in Australia, and we are already extremely excited to have a great training session full of...Building a Decoder for the CVE-2014-0502 Shellcode
by Volatility | Apr 8, 2014 | CVE-2014-0502, malware, volatility, windows
In late February of this year multiple security companies (FireEye, AlientVault, SecPod, Symantec, plus many more) were reporting on a Flash zero-day vulnerability (CVE-2014-0502) being exploited in the wild. Around this time a friend asked me if I...Training by The Volatility Project Now Available In Three Continents!
by Volatility | Feb 19, 2014 | training, volatility, windows
The Volatility Team is very happy to announce that we have a new website (http://www.memoryanalysis.net) and a number of upcoming training courses this year. With opportunities across three different continents, its now easier than ever before to learn about...Malware Superlatives: Most Likely to Cry s/Wolf/Crocodile/
by Volatility | Jan 21, 2014 | kernel, malware, superlatives, windows
As a young boy once learned, its bad to cry wolf. Its not necessarily bad to cry crocodile, but the authors of Blazgel decided to do it anyway. Blazgel is a kernel rootkit that hooks various SSDT entries and has some backdoor capabilities. When I first saw it hooking...Comparing the Dexter and BlackPOS (Target) RAM Scraping Techniques
by Volatility | Jan 16, 2014 | malware, pos, ram scaper, windows
Up until yesterday when Brian Krebs wrote A First Look at the Target Intrusion, Malware, there weren’t many details about the involved code. Now that its out there, I thought it might be interesting to see how the “RAM scraping” feature worked...
You must be logged in to post a comment.