en
Michael Hale Ligh

The Art of Memory Forensics

Obavesti me kada knjiga bude dodata
Da biste čitali ovu knjigu otpremite EPUB ili FB2 datoteku na Bookmate. Kako da otpremim knjigu?
  • Andrii Pastushenkoje citiraoпре 2 месеца
    $ python vol.py pslist > pslist.txt
    $ python vol.py pslist --output-file=pslist.txt
  • Andrii Pastushenkoje citiraoпре 2 месеца
    For example, if various plugins create _EPROCESS objects and they all commonly need to determine whether the process is suspicious, based on several factors, you can use an object class to add such logic. A simple example is shown in the following code:
  • Andrii Pastushenkoje citiraoпре 3 месеца
    third-party modules that Volatility can leverage and the specific plugins that utilize them
  • Andrii Pastushenkoje citiraoпре 3 месеца
    knowledge of an operating system’s specific implementation of an abstract data structure is paramount to learning why certain attacks (that manipulate the structure(s)) are successful and how memory analysis tools can help you detect such attacks
  • Andrii Pastushenkoje citiraoпре 3 месеца
    Hash table with chained-overflow example
  • Andrii Pastushenkoje citiraoпре 3 месеца
    Structure Type Definition _LIST_ENTRY64 on 64-Bit Versions of Windows
  • Andrii Pastushenkoje citiraoпре 3 месеца
    An example linked-list implementation used frequently in the Linux kernel is the circular linked list
  • Andrii Pastushenkoje citiraoпре 3 месеца
    Singly-linked list example
  • Andrii Pastushenkoje citiraoпре 3 месеца
    Structure Type Definition for _UNICODE_STRING on 64-Bit Versions of Windows
  • Andrii Pastushenkoje citiraoпре 3 месеца
    when analyzing the physical address space of a system that leverages paged virtual memory, you could encounter a string that crosses a page boundary to a page that is no longer memory resident, which would require special processing or heuristics to determine the actual size of the string
fb2epub
Prevucite i otpustite datoteke (ne više od 5 odjednom)