Building a Muscle Memory with Rekall Memory Forensic Framework
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
You are Freaking Awesome!
Memory Forensics IRL
Evidence in Memory
Rekall Memory Forensic Framework
Investigative Methodology: Use Case: Identifying Malware
Interactive Rekall Session
Profile Auto-detection
Session Caching
Process Enumeration pslist Using Volatility
Process Enumeration with Rekall Choose Your Poison Rekall's PSList Methods of Enumeration
Process Scanning with Rekall Output Options
Advantages of Baselining: "Know Normal, Find Evil."
MBR Persistence
Memory Analysis with Rekall Step 1: Identify Roque Processes
Know Normal (Windows Processes), Find Evil
Step 3: Network Connections
Signs of Code Injection
Detect Rootkit Behaviors
Memory Analysis with Rekall Step 6: Acquisition of Notable Findings
AFF4 Volume Format
Live Analysis with Rekall (1)
Live Analysis with Rekall (3) Acquisition
References
Related Courses
Foundations of Computer Science for TeachersThe University of Texas at Austin via edX Computer Forensics
Rochester Institute of Technology via edX FinTech Security and Regulation (RegTech)
The Hong Kong University of Science and Technology via Coursera Cyber Security
CEC via Swayam Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX