Linux Memory Analysis with Volatility- 101, Compromised Linux System

BlackPerl
BlackPerl
5.3 هزار بار بازدید - 2 سال پیش - Linux memory analysis  is a
Linux memory analysis  is a well known and researched topic. You're likely familiar with many tools that allow us to capture memory from a Windows system. But, have you ever wondered memory capture process for Linux system? And how can you analyze them using Volatility? Well, wait no longer, because that's exactly what we'll cover in this episode! I will show you the easiest process to perform memory capture for a Linux system and how to prepare your volatility tool to parse that memory dump to extract valuable information at the time of doing forensics investigation!

In today's episode I have tried to show you from scratch how can you analyze the memory of an infected Linux machine. What are the basic steps, basic plugins, how they differ from windows and how to pivot from one analytics to another.

👉Watch this episode- Linux Memory Capture and Analysis - V... for creation of Linux Kernel profile for volatility.

WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!
-------------------------------------------------------------------------------------------------------------------------
INCIDENT RESPONSE TRAINING Full Course 👉BlackPerl DFIR  || INCIDENT RESPONSE ...
DFIR Free Tools and Techniques 👉 BlackPerl DFIR || DFIR Tools and Tech...
Windows and Memory Forensics 👉 BlackPerl DFIR || Windows and Memory ...
Malware Analysis 👉 BlackPerl DFIR || Malware Analysis Se...
SIEM Tutorial 👉 BlackPerl DFIR || Learn SIEM with me ...
Threat Hunt & Threat Intelligence 👉 BlackPerl DFIR || Threat Hunt & Threa...
Threat Hunt with Jupyter Notebook👉 Threat Hunt with Jupyter Notebook

📞📲
FOLLOW ME EVERYWHERE-
-------------------------------------------------------------------------------------------------------------------------
✔ LinkedIn: LinkedIn: blackperl
✔ You can reach out to me personally in LinkedIn as well- https://bit.ly/38ze4L5
✔ Twitter: @blackperl_dfir
✔ Git: https://github.com/archanchoudhury
✔ Insta: (blackperl_dfir)Instagram: blackperl_dfir
✔ Can be reached via [email protected]

🙏Credit-
-------------------------------------------------------------------------------------------------------------------------
The sample memory image and this episode is influenced by the CTF prepared by 2phi and Nofix on CyberDefenders Platform. Huge Shout out to the Team for preparing this challenge. You can practice and complete the challenge from here- https://cyberdefenders.org/blueteam-c...
The answers need to be obtained by yourself and none of them have been provided here in this episode!
2 سال پیش در تاریخ 1401/04/03 منتشر شده است.
5,372 بـار بازدید شده
... بیشتر