en
Michael Hale Ligh

The Art of Memory Forensics

Сообщить о появлении
Загрузите файл EPUB или FB2 на Букмейт — и начинайте читать книгу бесплатно. Как загрузить книгу?
  • Andrii Pastushenkoцитирует3 месяца назад
    $ python vol.py pslist > pslist.txt
    $ python vol.py pslist --output-file=pslist.txt
  • Andrii Pastushenkoцитирует3 месяца назад
    For example, if various plugins create _EPROCESS objects and they all commonly need to determine whether the process is suspicious, based on several factors, you can use an object class to add such logic. A simple example is shown in the following code:
  • Andrii Pastushenkoцитирует3 месяца назад
    third-party modules that Volatility can leverage and the specific plugins that utilize them
  • Andrii Pastushenkoцитирует3 месяца назад
    knowledge of an operating system’s specific implementation of an abstract data structure is paramount to learning why certain attacks (that manipulate the structure(s)) are successful and how memory analysis tools can help you detect such attacks
  • Andrii Pastushenkoцитирует3 месяца назад
    Hash table with chained-overflow example
  • Andrii Pastushenkoцитирует3 месяца назад
    Structure Type Definition _LIST_ENTRY64 on 64-Bit Versions of Windows
  • Andrii Pastushenkoцитирует3 месяца назад
    An example linked-list implementation used frequently in the Linux kernel is the circular linked list
  • Andrii Pastushenkoцитирует3 месяца назад
    Singly-linked list example
  • Andrii Pastushenkoцитирует3 месяца назад
    Structure Type Definition for _UNICODE_STRING on 64-Bit Versions of Windows
  • Andrii Pastushenkoцитирует3 месяца назад
    when analyzing the physical address space of a system that leverages paged virtual memory, you could encounter a string that crosses a page boundary to a page that is no longer memory resident, which would require special processing or heuristics to determine the actual size of the string
fb2epub
Перетащите файлы сюда, не более 5 за один раз