Download presentation
Presentation is loading. Please wait.
Published byRosalyn Henderson Modified over 9 years ago
3
Deeper research never hurts!
5
Check out the following links: Our tools: http://cqure.pl Tools http://www.gentilkiwi.com/ - Benjamin Delpy http://code.google.com/p/volatility
8
Memory dumps contain personal information, but… how personal?
9
Memory Forensics grabs the data at the lowest level: (most) malware cannot hide!
12
Processes Threads Modules Handles Registry Apihooks Services UserAssist Shellbags ShimCache Event Logs Registry (again) Timeline
18
Memoryze: Live analysis
27
www.microsoft.com/learning http://developer.microsoft.com http://microsoft.com/technet http://channel9.msdn.com/Events/TechEd
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.