Malware Analysis with SIFT and Volatility
Hey all, I decided to go ahead and do a written blog post for this one. This is the first time I have looked into Malware analysis, but I figured why not. It was too cold here in Korea to do anything...
View ArticleZeus v2 Malware Analysis – Part II
Welcome back for Part II. I am going to be taking a look at memory forensics by way of Volatility. Memory Forensics Let’s kick this section off by running the volatility command, “imageinfo”. The...
View ArticleAPTish Attack via Metasploit – Part III – Memory Analysis
INTRO: Some of you might be familiar with GrrCon [1]. I wasn’t until this year. I found out about them after reading a post by the Volatility guys/gals [2]. In the post they discuss how they used...
View Article