If you are interested in memory forensics, and especially in identifying malware in memory dumps, this post by Adam Bridge may be very interesting for you. In this article Brian and his teammates lay out a real-life examination of computer memory which enabled them to identify a keylogger that was running, what files were responsible for running it, and how it managed to ensure it was started every time the machine booted up.

Load More Related Articles
Load More In How To

Leave a Reply

Your email address will not be published. Required fields are marked *