Y R O. Memory Forensics: A Volatility Primer M E M. Mariano Graziano. Security Day - Lille1 University January Lille, France
|
|
- Marilynn Doyle
- 8 years ago
- Views:
Transcription
1 emory Forensics: A Volatility Primer ariano Graziano Security Day - Lille1 University January Lille, France
2 whoami Ph.D student at urecom (France) sc from Politecnico di Torino (Italy) ain topics: alware analysis, emory forensics Wasted the best years on IC Interests: xploitation techniques, *Nix Kernel hacking, CTFs
3 utline emory forensics Volatility Windows Linux Virtualization Support Hypervisor Structures Virtual achines Analysis Future Work
4 emory Forensics Process of capturing a copy of the system memory (A) to extract a number of evidences that are useful for an investigation Steps: Take the memory dump Locate raw data structures xtract information (encryption keys, passwords, etc) New field (~2005) and very active research area
5 Pros emory is smaller than hard-drives very attack has a memory footprint Advanced samples reside only in memory
6 Cons S diversity: Data structures Semantic Gap emory changes: Content authenticity Acquisition paradox
7 utline emory forensics Volatility Windows Linux Virtualization Support Hypervisor Structures Virtual achines Analysis Future Work
8 emory Analysis etrieve specific information (processes, IP addresses, etc) Fill the Semantic Gap equire S internals knowledge (the more, the better)
9 xisting Frameworks Don't reinvent the wheel! Volatility (Volatility Foundation) emoryze (andiant) ekall (Google)
10 Framework Internals They all share the same concepts Step 1: Locating structures Fixed offsets Data structures walking Linear scanning emember the S diversity
11 Interesting Structures Depend on the S Define your interest Processes? PCSS, KPCSS, PB, etc task_struct, mm_struct, etc
12 _PCSS _PCSS: 'Pcb': 0x0, '_KPCSS', 'ProcessLock' : 0x98, '_X_PUSH_LCK', 'ActiveProcessLinks' : 0xb8,... 'Peb' : 0x1a8, '_PB', 'PrefetchTrace' : 0x1ac, '_X_FAST_F',... Flink && Blink '_KPCSS' 'Header' : 0x0, '_DISPATCH_HAD',... 'DirectoryTableBase' : 0x18, 'LdtDescriptor' : 0x1c, '_KGDTNT',...
13 Interesting Process Information PCSS: PB: Creation and xit Time PID && PPID Pointer to the handler table VAD etc Pointer to the Image Base Address Pointer to the DLLs loaded Heap Size etc
14 Volatility pen Source emory analysis framework born in 2007 Python Current version 2.4 (August 2014) FATKit volution (by Petroni and Walters, DFI Journal 2006)
15 Volatility 2.4 Windows (XP, Vista, 7, 2003, 2008, 8, 8.1) Linux 32 and 64 bit acsx 10.5 to Android It works with crash dumps, hibernation files, V snapshots, Lime format and plain raw dumps.
16 Volatility Plugins Volatility is highly modular asy to add new features/supports ~160 plugins for ~25 profiles Several plugins for malware analysis python vol.py --info
17 Bootstrap the Analysis Linux: /boot/system.map-$(uname -r) Windows: ekall: Volatility: Scan the memory to find SDS signature xtract GUID and PDB filename Query the icrosoft public symbols server From the PDB file extracts of many symbols Scan the memory to find the KDBG to locate PsActiveProcessHead (Prone to Anti-forensics) Drawback: Locate KDBG: XP/Vista via KPC Win8 encoded
18 Processes Pslist: Walk the PCSS objects list Pstree: Like pslist but it prints out the tree Psscan: Scan the memory for the PCSS signature (find hidden and terminated processes as well)
19 Address Translation Do you remember the Semantic Gap? All the pointers we have found are Virtual Addresses and we have a physical memory dump We need to emulate the U work Volatility solution: Address Spaces (IA-32, IA-32 PA, IA-32e, A, etc)
20 Address Translation IA-32
21 utline emory forensics Volatility Windows Linux Virtualization Support Hypervisor Structures Virtual achines Analysis Future Work
22 The problem Virtualization is everywhere No support to analyze: Virtual achines Hypervisors Nested configurations
23 The solution Actaeon core: VCS layout extractor Hyperls Virtual achine Introspection patch
24 Warning Actaeon IS NT: A tool to dump the physical memory A real time detector for malicious hypervisors A malware detector
25 VCS Virtual achine Control Structure Intel VX structure to handle VX transistions emory structure containing information for keeping the state of the system Fields listed in the Intel anual but the layout is implementation specific
26 VCS Simple reverse algorithm based on an pen Source hypervisor (HyperDbg): VCS fields are associated with a 32 bits value (encoding) that is used by VAD/VWIT instructions The position is derived from the encoding in the processor microcode so we filled the VCS region with 16 bit incremental numbers We rebuilt the position of every field in the VCS by associating the encoding value to the generated value
27 Hypervisor Discovery Four heuristics on VCS fields: VISIN_ID: Determine the VCS memory layout. ust match the value of S 0x480 (IA32 VX_BASIC_S) VX_ABT_INDICAT: ust be zero. It is the second entry of the VCS area. VCS_LINK_PINT: Two consecutive words. They must be 0xFFFFFFFF HST_C4: The 13th bit indicates if VX support is enabled or not.
28 PT xtended Page Tables Provide memory isolation among virtual machines arked in a field in the VCS (Secondary Based xecution Control) Provide an additional layer of translation (remember U?) transparent and in hardware Translation from a GPA to an HPA Translation has four stages (PL4, PDPT, PD, PT)
29 VI Virtual achine Introspection via PT Locate VCS and extract the PT pointer Simulate PT translation Patch the Volatility core to add the PT support
30 utline emory forensics Volatility Windows Linux Virtualization Support Hypervisor Structures Virtual achines Analysis Future Work
31 Actaeon Integration in Volatility x86-64 support Full Hyper-V support ore testing for nested environments VCS Shadowing support Find reliable solution to dump type-1 hypervisors
32 emory Forensics ore research effort to enhance/ease malware analysis ore communication among researchers Leverage memory forensics Lack of support for: Net/pen/Free/BSD Solaris/SPAC mulators (Qemu/Bochs/etc) Containers (LXC/penVZ/Docker/etc)
33 Contact ail: graziano <at> eurecom <dot> fr IC: emdel/emd3l (Freenode/fnet/W3challs) We are looking for motivated and skilled Ph.D students. Feel free to contact me.
Hypervisor Memory Forensics
Hypervisor Memory Forensics Mariano Graziano and Davide Balzarotti SANS DFIR EU SUMMIT October 2013 - Prague S3 GROUP S3 GROUP Actaeon Memory forensics of virtualization environments Locate any Intel Hardware
More informationUnder the Hood: How Actaeon Unveils Your Hypervisor
Under the Hood: How Actaeon Unveils Your Hypervisor Eurecom, Sophia Antipolis, France, EU HITB Kuala Lumpur, October 2013 Table of Contents Eurecom S3 Security Lab What s the problem we are facing Why
More informationFATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory p.1/11
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory DFRWS 2006: Work in Progress (WIP) Aug 16, 2006 AAron Walters 4TΦ Research Nick L. Petroni Jr. University
More informationDetecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
More informationHypervisor Memory Forensics
Hypervisor Memory Forensics Mariano Graziano, Andrea Lanzi, and Davide Balzarotti Eurecom, France graziano,lanzi,balzarotti@eurecom.fr Abstract. Memory forensics is the branch of computer forensics that
More informationCHAD TILBURY. chad@forensicmethods.com. http://forensicmethods.com @chadtilbury
CHAD TILBURY chad@forensicmethods.com 0 Former: Special Agent with US Air Force Office of Special Investigations 0 Current: Incident Response and Computer Forensics Consultant 0 Over 12 years in the trenches
More informationPeeking into Pandora s Bochs. Instrumenting a Full System Emulator to Analyse Malicious Software
Instrumenting a Full System Emulator to Analyse Malicious Software Lutz Böhne (lutz.boehne@redteam-pentesting.de) RedTeam Pentesting GmbH http://www.redteam-pentesting.de April 9th 2010, Paris Hackito
More informationOne-byte Modification for Breaking Memory Forensic Analysis
One-byte Modification for Breaking Memory Forensic Analysis Takahiro Haruyama / Hiroshi Suzuki Internet Initiative Japan Inc. for submission Summary Memory Forensics Overview Memory Acquisition Memory
More informationCS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
More informationDigital Forensic analysis of malware infected machine Case study ***
Abstract Digital Forensic analysis of malware infected machine Case study Amulya Podile, Keerthi G & Krishna Sastry Pendyala# Incident Response & Malware Analysis Unit, Digital Forensics CoE, Tata Consultancy
More informationAn Introduction to Incident Detection and Response Memory Forensic Analysis
An Introduction to Incident Detection and Response Memory Forensic Analysis Alexandre Dulaunoy - TLP:WHITE a@foo.be February 6, 2015 An overview to incident response Detection Analysis Containment Investigation
More informationVirtualization in Linux KVM + QEMU
CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization
More informationMobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
More informationMemory Forensics with Hyper-V Virtual Machines. By: @wyattroersma
Memory Forensics with Hyper-V Virtual Machines By: @wyattroersma Who Am I? Wyatt Roersma NVINT Senior Security Engineer Mad Security DFIR challenge creator The Hacker Academy Content Dev I research for
More informationAutomating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
More informationManual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
More informationRun-Time Deep Virtual Machine Introspection & Its Applications
Run-Time Deep Virtual Machine Introspection & Its Applications Jennia Hizver Computer Science Department Stony Brook University, NY, USA Tzi-cker Chiueh Cloud Computing Center Industrial Technology Research
More informationDoD Cyber Crime Center
DoD Cyber Crime Center (DC3) Digital Forensics Challenge 2013 Team Northrop Grumman April 30, 2014 Jesse Mayer Northrop Grumman Cyber Security Operations Center DC3 Digital Forensics Challenge Annual Competition
More informationESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
More informationF-Secure Internet Security 2014 Data Transfer Declaration
F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3
More informationIntroduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
More informationBefore we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
More informationQ-CERT Workshop. Matthew Geiger mgeiger@cert.org. 2007 Carnegie Mellon University
Memory Analysis Q-CERT Workshop Matthew Geiger mgeiger@cert.org 2007 Carnegie Mellon University Outline Why live system forensics? Previous techniques Drawbacks and new thinking Approaches to memory acquisition
More informationHow To Use Truecrypt For Free On A Pc Or Mac Or Mac (For A Laptop) For A Long Time (For Free) For Your Computer Or Ipad Or Ipa (For Mac) For Free (For Your Computer) For Long
Advanced Open-Source /Free Solutions for Home and Small Business Owners Robert Baldi, CISSP- ISSEP TOPICS Encryption Backups Audits Wireless Security Network Security Open Source Goodness ENCRYPTION Encryption
More informationA Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami (murakami@fourteenforty.jp) Fourteenforty Research Institute, Inc. Recently malware has become more
More informationWelcome to the IBM Education Assistant module for Tivoli Storage Manager version 6.2 Hyper-V backups. hyper_v_backups.ppt.
Welcome to the IBM Education Assistant module for Tivoli Storage Manager version 6.2 Hyper-V backups. Page 1 of 21 You are familiar with Tivoli Storage Manager version 5.5 or higher. Page 2 of 21 When
More informationAndroid Development. Lecture AD 0 Android SDK & Development Environment. Università degli Studi di Parma. Mobile Application Development
Android Development Lecture AD 0 Android SDK & Development Environment 2013/2014 Parma Università degli Studi di Parma Lecture Summary Android Module Overview The Android Platform Android Environment Setup
More informationProf. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece
Prof. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece University of Piraeus, Greece Department of Digital Systems System Security Laboratory founded
More informationHadoop and Map-Reduce. Swati Gore
Hadoop and Map-Reduce Swati Gore Contents Why Hadoop? Hadoop Overview Hadoop Architecture Working Description Fault Tolerance Limitations Why Map-Reduce not MPI Distributed sort Why Hadoop? Existing Data
More informationMemory Forensics: Collecting & Analyzing Malware Artifacts from RAM
Memory Forensics: Collecting & Analyzing Malware Artifacts from RAM ISSA DC Chapter March 15, 2011 Presented by: Inno Eroraha, CISSP, CISM, CHFI, PI NetSecurity Corporation 21351 Gentry Drive, Suite 230
More informationVirtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
More informationAn overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
More informationNested Virtualization
Nested Virtualization Dongxiao Xu, Xiantao Zhang, Yang Zhang May 9, 2013 Agenda Nested Virtualization Overview Dive into Nested Virtualization Details Nested CPU Virtualization Nested MMU Virtualization
More informationIntel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
More information1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
More informationRecon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
More informationCloud Security Is Not (Just) Virtualization Security
Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni IBM Research Cloud Security Is Not (Just) Virtualization Security Virtualization Enables Many Security Applications
More informationVirtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
More informationF-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
More informationAndroid Packer. facing the challenges, building solutions. Rowland YU. Senior Threat Researcher Virus Bulletin 2014
Android Packer facing the challenges, building solutions Rowland YU Senior Threat Researcher Virus Bulletin 2014 1 What is Android Packer? Android packers are able to encrypt an original classes.dex file,
More informationVMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
More informationHypervisor-Based, Hardware-Assisted System Monitoring
Horst Görtz Institute for IT-Security, Chair for System Security VMRay GmbH Hypervisor-Based, Hardware-Assisted System Monitoring VB2013 October 2-4, 2013 Berlin Carsten Willems, Ralf Hund, Thorsten Holz
More informationLecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu
Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches
More informationOutline. Introduction. State-of-the-art Forensic Methods. Hardware-based Workload Forensics. Experimental Results. Summary. OS level Hypervisor level
Outline Introduction State-of-the-art Forensic Methods OS level Hypervisor level Hardware-based Workload Forensics Process Reconstruction Experimental Results Setup Result & Overhead Summary 1 Introduction
More informationPeeking into Pandora's Bochs { Instrumenting a Full System Emulator to Analyse Malicious Software
{ Instrumenting a Full System Emulator to Analyse Malicious Software Lutz Bohne (lutz.boehne@redteam-pentesting.de) RedTeam Pentesting GmbH http://www.redteam-pentesting.de October, 28th, Luxembourg hack.lu
More informationExperience with Server Self Service Center (S3C)
Experience with Server Self Service Center (S3C) Juraj Sucik, Sebastian Bukowiec IT Department, CERN, CH-1211 Genève 23, Switzerland E-mail: juraj.sucik@cern.ch, sebastian.bukowiec@cern.ch Abstract. CERN
More informationCompromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
More informationComputer Forensics: Results of Live Response Inquiry vs. Memory Image Analysis
Computer Forensics: Results of Live Response Inquiry vs. Memory Image Analysis Cal Waits Joseph Ayo Akinyele Richard Nolan Larry Rogers August 2008 TECHNICAL NOTE CMU/SEI-2008-TN-017 CERT Program Unlimited
More informationOperating System Overview. Otto J. Anshus
Operating System Overview Otto J. Anshus A Typical Computer CPU... CPU Memory Chipset I/O bus ROM Keyboard Network A Typical Computer System CPU. CPU Memory Application(s) Operating System ROM OS Apps
More informationCSE 501 Monday, September 09, 2013 Kevin Cleary kpcleary@buffalo.edu
CSE 501 Monday, September 09, 2013 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? Practical Uses What can be virtualized Popular virtualization products Demo Question, answer, discussion Can
More informationDeveloping a dynamic, real-time IT infrastructure with Red Hat integrated virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges
More informationSystem Requirements Guide
SAP Business One PUBLIC System Requirements Guide SAP Business One Applicable Release: All Releases as of SAP Business One 2007 and higher All Countries English December 2011 SUPPORTED PLATFORMS OVERVIEW
More informationVPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
More informationFull and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
More informationkvm: Kernel-based Virtual Machine for Linux
kvm: Kernel-based Virtual Machine for Linux 1 Company Overview Founded 2005 A Delaware corporation Locations US Office Santa Clara, CA R&D - Netanya/Poleg Funding Expertise in enterprise infrastructure
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationIntro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
More informationGoals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
More informationCOURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
More informationComparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
More informationwww.securityxploded.com
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are solely of the
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationThat Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
More informationThe Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
More informationThe Process of Acquiring Live Systems
The Process of Acquiring Live Systems Daniel DeFreez Jonathan McCoy 2009 Grant funding from Southern Oregon University Abstract This paper describes a process for acquiring a live system independent of
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationWindows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org
Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationUniversità Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012
Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android
More informationPresenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
More informationCRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
More informationTelecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
More informationA Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology jreubens@cc.hut.fi Abstract Virtualization plays a major role in helping the organizations to reduce the operational
More informationMichael Ligh (@imhlv2)
Michael Ligh (@imhlv2) Suspect uses TrueCrypt for disk encryp?on Most recent version: 7.1a Suspect runs Windows 8 / Server 2012 What can you do, given a disk and memory image? Provide three of the most
More informationSNMP Test er Manual 2015 Paessler AG
SNMP Test er Manual 2015 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying, recording, taping,
More informationHyper-V R2: What's New?
ASPE IT Training Hyper-V R2: What's New? A WHITE PAPER PREPARED FOR ASPE BY TOM CARPENTER www.aspe-it.com toll-free: 877-800-5221 Hyper-V R2: What s New? Executive Summary This white paper provides an
More informationCMPS223 Final Project Virtual Machine Introspection Techniques
CMPS223 Final Project Virtual Machine Introspection Techniques Michael Sevilla University of California, Santa Cruz msevilla@soe.ucsc.edu December 4, 2012 1 Introduction This work is a survey of Virtual
More informationThe Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
More informationMcAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
More informationRed Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
More informationDongwoo Kim : Hyeon-jeong Lee s Husband
2/ 32 Who we are Dongwoo Kim : Hyeon-jeong Lee s Husband Ph.D. Candidate at Chungnam National University in South Korea Majoring in Computer Communications & Security Interested in mobile hacking, digital
More informationPerformance Monitoring of the Software Frameworks for LHC Experiments
Proceedings of the First EELA-2 Conference R. mayo et al. (Eds.) CIEMAT 2009 2009 The authors. All rights reserved Performance Monitoring of the Software Frameworks for LHC Experiments William A. Romero
More informationArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
More informationSecurity Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those
More informationMicrosoft s Advantages and Goals for Hyper-V for Server 2016
Virtualization is a bedrock of modern cloud environments. Hypervisors manage the virtual machines in a cloud environments, providing six fundamental features, as shown in the table below. 1 Hypervisors
More informationIntel P6 Systemprogrammering 2007 Föreläsning 5 P6/Linux Memory System
Intel P6 Systemprogrammering 07 Föreläsning 5 P6/Linux ory System Topics P6 address translation Linux memory management Linux page fault handling memory mapping Internal Designation for Successor to Pentium
More informationWeb Hosting. E-Mail Hosting. Cloud File Hosting. The Genio Group (214) 732-7411 info@thegeniogroup.com www.thegeniogroup.com
Web Hosting E-Mail Hosting Cloud File Hosting Genio Hosting Servers All of Genio s Hosting Servers run on Apple hardware running Mac OS X Server. Mac OS X Server leverages the computing power of 64-bit
More informationAndroid Security Evaluation Framework
INTRODUCING... A S E F Android Security Evaluation Framework - Parth Patel $ whoami_ Agenda Manual Research Automation - A S E F Let s solve problems Conclusion Android OS Open Source Security Evaluation
More informationNFCulT. An easy a nice tool that will make you have fun, or... make profit!
NFCulT An easy a nice tool that will make you have fun, or... make profit Matteo Beccaro ( aka bughardy ) Student at Politecnico di Torino Computer Engineering Security Engineer and researcher at Secure
More informationEnCase Endpoint Investigator Fundamentals 5/25/2016
EnCase Endpoint Investigator Fundamentals Guidance Software 1 About Us Tony Balzanto Tony Balzanto is an instructor in the Orlando, FL office of Guidance Software s Professional Development and Training
More informationIntel Virtualization Technology Overview Yu Ke
Intel Virtualization Technology Overview Yu Ke SSG System Software Division Agenda Virtualization Overview Intel Virtualization Technology 2 What is Virtualization VM 0 VM 1 VM n Virtual Machines (VMs)
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
More informationKVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com
KVM: A Hypervisor for All Seasons Avi Kivity avi@qumranet.com November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationHijacking Arbitrary.NET Application Control Flow. Topher Timzen
Hijacking Arbitrary.NET Application Control Flow Topher Timzen #whoami Topher Timzen Security Researcher, Intel Security Trainer @TTimzen TopherTimzen.com Overview.NET? Runtime Attacks Modify Control Flow
More informationImplementing Security on virtualized network storage environment
International Journal of Education and Research Vol. 2 No. 4 April 2014 Implementing Security on virtualized network storage environment Benard O. Osero, David G. Mwathi Chuka University bosero@chuka.ac.ke
More informationFull System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. chris@lastline.com 1 Introduction Automated malware analysis systems (or sandboxes)
More information