bookmate game
en
Michael Hale Ligh

The Art of Memory Forensics

Уведоми ме, когато книгата е добавена
За да прочете тази книга, качете я във формат EPUB или FB2 в Bookmate. Как се качва книга?
  • Andrii Pastushenkoцитирапреди 5 месеца
    $ python vol.py pslist > pslist.txt
    $ python vol.py pslist --output-file=pslist.txt
  • Andrii Pastushenkoцитирапреди 5 месеца
    For example, if various plugins create _EPROCESS objects and they all commonly need to determine whether the process is suspicious, based on several factors, you can use an object class to add such logic. A simple example is shown in the following code:
  • Andrii Pastushenkoцитирапреди 5 месеца
    third-party modules that Volatility can leverage and the specific plugins that utilize them
  • Andrii Pastushenkoцитирапреди 6 месеца
    knowledge of an operating system’s specific implementation of an abstract data structure is paramount to learning why certain attacks (that manipulate the structure(s)) are successful and how memory analysis tools can help you detect such attacks
  • Andrii Pastushenkoцитирапреди 6 месеца
    Hash table with chained-overflow example
  • Andrii Pastushenkoцитирапреди 6 месеца
    Structure Type Definition _LIST_ENTRY64 on 64-Bit Versions of Windows
  • Andrii Pastushenkoцитирапреди 6 месеца
    An example linked-list implementation used frequently in the Linux kernel is the circular linked list
  • Andrii Pastushenkoцитирапреди 6 месеца
    Singly-linked list example
  • Andrii Pastushenkoцитирапреди 6 месеца
    Structure Type Definition for _UNICODE_STRING on 64-Bit Versions of Windows
  • Andrii Pastushenkoцитирапреди 6 месеца
    when analyzing the physical address space of a system that leverages paged virtual memory, you could encounter a string that crosses a page boundary to a page that is no longer memory resident, which would require special processing or heuristics to determine the actual size of the string
fb2epub
Плъзнете и пуснете файловете си (не повече от 5 наведнъж)