en
Michael Hale Ligh

The Art of Memory Forensics

Obavesti me kada knjiga bude dodata
Da biste čitali ovu knjigu otpremite EPUB ili FB2 datoteku na Bookmate. Kako da otpremim knjigu?
  • Andrii Pastushenkoje citiraoпре 6 месеци
    $ python vol.py pslist > pslist.txt
    $ python vol.py pslist --output-file=pslist.txt
  • Andrii Pastushenkoje citiraoпре 6 месеци
    For example, if various plugins create _EPROCESS objects and they all commonly need to determine whether the process is suspicious, based on several factors, you can use an object class to add such logic. A simple example is shown in the following code:
  • Andrii Pastushenkoje citiraoпре 6 месеци
    third-party modules that Volatility can leverage and the specific plugins that utilize them
  • Andrii Pastushenkoje citiraoпре 6 месеци
    knowledge of an operating system’s specific implementation of an abstract data structure is paramount to learning why certain attacks (that manipulate the structure(s)) are successful and how memory analysis tools can help you detect such attacks
  • Andrii Pastushenkoje citiraoпре 6 месеци
    Hash table with chained-overflow example
  • Andrii Pastushenkoje citiraoпре 6 месеци
    Structure Type Definition _LIST_ENTRY64 on 64-Bit Versions of Windows
  • Andrii Pastushenkoje citiraoпре 6 месеци
    An example linked-list implementation used frequently in the Linux kernel is the circular linked list
  • Andrii Pastushenkoje citiraoпре 6 месеци
    Singly-linked list example
  • Andrii Pastushenkoje citiraoпре 6 месеци
    Structure Type Definition for _UNICODE_STRING on 64-Bit Versions of Windows
  • Andrii Pastushenkoje citiraoпре 6 месеци
    when analyzing the physical address space of a system that leverages paged virtual memory, you could encounter a string that crosses a page boundary to a page that is no longer memory resident, which would require special processing or heuristics to determine the actual size of the string
fb2epub
Prevucite i otpustite datoteke (ne više od 5 odjednom)