Memory Forensics: Collecting & Analyzing Malware Artifacts from RAM
|
|
|
- Thomasina Hamilton
- 9 years ago
- Views:
Transcription
1 Memory Forensics: Collecting & Analyzing Malware Artifacts from RAM ISSA DC Chapter March 15, 2011 Presented by: Inno Eroraha, CISSP, CISM, CHFI, PI NetSecurity Corporation Gentry Drive, Suite 230 Dulles, VA 20166
2 Agenda 2 Why Memory Forensics? Type of Memory Collection Approaches Remote Local Collection Techniques and Tools Analysis Techniques and Tools Conclusion
3 Memory Forensics Questions 3 What processes were running on the suspect system at the time memory image was taken? What (hidden or closed) processes existed? Are there any (hidden or closed) network connections? Are there any (hidden or closed) sockets? What is the purpose and intent of the suspected file? Are there any suspicious DLL modules? Are there any suspicious URLs or IP addresses associated with a process? Are there any suspicious open files associated with a process? Are there any closed or hidden files associated with any process?
4 Memory Forensics Questions 4 (Contd.) Are there any suspicious strings associated with a particular process? Are there any suspicious files present? Can you extract them? Can you extract malicious processes from the memory and analyze it? Can you identify the attackers and their IP addresses? Did the attacker create a user account on the system? Did the malware modify or add any registry entry? Does the malware use any type of hooks to hide itself? Did the malware inject itself to any running processes? What is the relationship between different processes? What is the intent and purpose of this malware?
5 Real-World Scenario 5 The Problem: Ted, a Marketing Director, at Ojehtrade & Co Inc., received a Hallmark E-Greeting Card from a colleague, Maria When Ted opened the E-Greeting Card, it opened a graphic image of animals When Ted saw Maria later in the day, he thanked her for the E-Greeting Card Maria told Ted that she did not send him any E-greeting card! Ted called Mike, the Network Security Lead, and told him what happened Mike asked one of his Security Analysts to make a Memory Image of Ted s computer Your Task: You are a Security Analyst at Ojehtrade & Co, Inc., tasked to investigate the incident How would you go about performing this investigation if all you have is the Memory image?
6 MEMORY ACQUISITION
7 RAM Acquisition Tools 7 Winen (Guidance Software) FastDump Pro (HB Gary) - Limited Free version available FTK Imager - Free DD Free but limited - May not work on later versions of Windows WinHex - Has some limitations Nigilant32 - Free but for 32-bit systems only Memoryze (Mandiant) - Free
8 RAM Acquisition with FTK Imager 8
9 RAM Acquisition with DD 9 MDD_1.3.exe by ManTech DD in Unix
10 MEMORY ANALYSIS
11 RAM Analysis Tools 11 Some commercial forensics tools have built-in capabilities Volatility Framework Mandiant Memoryze HB Gary Responder
12 Volatility Framework 12 Volatility supports the following extraction capabilities for memory images: Image date and time Running processes Open network sockets Open network connections DLLs loaded for each process Open files for each process Open registry keys for each process Memory maps for each process Extract executable samples Scanning examples: processes, threads, sockets, connections, modules
13 Volatility Modules 13 Image Identification imageinfo datetime kdbgscan Kprcscan Process Memory memmap memdump procmemdump procexedump vadwalk vadtree vadinfo vaddump Processes and DLLs pslist pstree psscan2 dlllist dlldump files regobjkeys getsids verinfo Kernel Memory and Objects modules modscan2 moddump ssdt driverscan filescan mutantscan thrdscan2
14 Volatility Modules (Contd.) 14 Networking connections connscan2 sockets sockscan netscan Registry hivescan hivelist printkey hivedump hashdump lsadump Malware and Rootkits malfind svcscan ldrmodules impscan apihooks idt gdt orphanthreads callbacks driverirp psxview ssdt_ex ssdt_by_threads
15 Volatility Modules (Contd.) 15 Crash Dumps, Hibernation, and Conversion crashinfo hibdump hibinfo imagecopy Miscellaneous strings volshell bioskbd inspectcache patcher testsuite Source:
16 Volatility Usage 16
17 Working with RAM Images 17 Image Identification volatility ident -f HOHTLE4.vmem Identify Suspicious Processes volatility pslist -f HOHTLE4.vmem volatility psscan2 -f HOHTLE4.vmem (EXITED!) Identify active, hidden or closed connections volatility connections -f HOHTLE4.vmem volatility connscan2 -f HOHTLE4.vmem (hidden)
18 Working with Images (Cont.) 18 Identify active, hidden or closed volatility sockets -f HOHTLE4.vmem volatility sockscan2 -f HOHTLE4.vmem (hidden) Identify suspicious dlls and any open, hidden or closed files volatility dlllist -f HOHTLE4.vmem volatility files -f HOHTLE4.vmem > files.txt volatility fileobjscan -f HOHTLE4.vmem > fileobjscan.txt (hidden)
19 Working with Images (Cont.) 19 Identify suspicious strings for each suspect process volatility memdmp -f HOHTLE4.vmem -p <PID> > PID.dmp strings PID.dmp > PID_ASCII.txt Extract Executable (EXE) volatility procdump -f HOHTLE4.vmem -p <PID> Verify Online at VirusTotal, VirusScan, etc.
20 Working with Images (Cont.) 20
21 Data Carving Using Foremost 21 Foremost foremost -c foremost.conf -t exe i <PID>.dmp -o output3
22 Scan for Registry Artifacts 22 volatility hivescan -f HOHTLE4.vmem volatility hivelist -f HOHTLE4.vmem -o 0x212cb60
23 Analyzing Extracted Executables 23 Using the resulting EXE from procdump, analyze the EXE further Scan using Anti-Virus Run in a Virtual Machine Analyze using Static means Analyze using Dynamic means Perform Code Analysis
24 QUESTIONS & ANSWERS
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
Digital Forensic analysis of malware infected machine Case study ***
Abstract Digital Forensic analysis of malware infected machine Case study Amulya Podile, Keerthi G & Krishna Sastry Pendyala# Incident Response & Malware Analysis Unit, Digital Forensics CoE, Tata Consultancy
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
CHAD TILBURY. [email protected]. http://forensicmethods.com @chadtilbury
CHAD TILBURY [email protected] 0 Former: Special Agent with US Air Force Office of Special Investigations 0 Current: Incident Response and Computer Forensics Consultant 0 Over 12 years in the trenches
An Introduction to Incident Detection and Response Memory Forensic Analysis
An Introduction to Incident Detection and Response Memory Forensic Analysis Alexandre Dulaunoy - TLP:WHITE [email protected] February 6, 2015 An overview to incident response Detection Analysis Containment Investigation
http://computer forensics.sans.org/course/computer forensic investigations andincident response 98 1
SIFTWORKSTATION2.0DISTROVERSION DETAILEDINFORMATION SIFTWorkstation2.0DevelopedbyRobLeeanddistributedasapartoftheSANSInstitute'sComputer ForensicCurriculum.(http://computer forensics.sans.org) TheSIFTWorkstationisreleasedunderGPL.
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory p.1/11
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory DFRWS 2006: Work in Progress (WIP) Aug 16, 2006 AAron Walters 4TΦ Research Nick L. Petroni Jr. University
2015 Forensic Challenge. Nino Vincenzo Verde, PhD Antonio Villani, PhD. {verde,villani}@di.uniroma1.it
2015 Forensic Challenge Nino Vincenzo Verde, PhD Antonio Villani, PhD {verde,villani}@di.uniroma1.it Dipartimento di Informatica Università di Roma "La Sapienza" 113 Via Salaria, 00198 Roma, ITALY Dipartimento
Physical Memory Standard Operating Procedures
MORGAN STANLEY Physical Memory Standard Operating Procedures HBGary Memory Forensic Tools Phil Wallisch 5/11/2010 This document details the procedures that Morgan Stanley CERT will perform to acquire and
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
www.securityxploded.com
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are solely of the
Redline Users Guide. Version 1.12
Redline Users Guide Version 1.12 Contents Contents 1 About Redline 5 Timeline 5 Malware Risk Index (MRI) Score 5 Indicators of Compromise (IOCs) 5 Whitelists 5 Installation 6 System Requirements 6 Install
TOOLS FOUND ON SIFT WORKSTATION 2.12 FINAL
Contents SIFT 2.1 Development and Thanks... 2 Background... 2 Basic Configuration Information... 2 SIFT Workstation Recommended Software Requirements... 3 SIFT Workstation 2.12 Capabilities... 5 Tools,
One-byte Modification for Breaking Memory Forensic Analysis
One-byte Modification for Breaking Memory Forensic Analysis Takahiro Haruyama / Hiroshi Suzuki Internet Initiative Japan Inc. for submission Summary Memory Forensics Overview Memory Acquisition Memory
Michael Ligh (@imhlv2)
Michael Ligh (@imhlv2) Suspect uses TrueCrypt for disk encryp?on Most recent version: 7.1a Suspect runs Windows 8 / Server 2012 What can you do, given a disk and memory image? Provide three of the most
Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code
Brochure More information from http://www.researchandmarkets.com/reports/2251703/ Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code Description: A computer forensics
Responding to the Digital Crime Scene: Gathering Volatile Data
Responding to the Digital Crime Scene: Gathering Volatile Data Inno Eroraha, CISSP, CISM, CISA, CHFI, PI Founder & Chief Strategist NetSecurity Corporation October 29, 2008 Presentation Objectives To discuss
Redline Users Guide. Please visit our forums: https://forums.mandiant.com/
Redline Users Guide Please visit our forums: https://forums.mandiant.com/ MANDIANT Redline Users Guide MANDIANT Corporation MANDIANT Redline Users Guide Disclaimer Copyright 2012 Mandiant Corporation.
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan
Fahad Ehsan Cyber Security Researcher Where it all started. ------------------------------------------------------------------------------------------ Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt)
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Memory Forensics & Security Analytics: Detecting Unknown Malware
Memory Forensics & Security Analytics: Detecting Unknown Malware SESSION ID: SEC-T09 Fahad Ehsan Associate Director Security Research and Analytics UBS AG Where it all started. ------------------------------------------------------------------------------------------
Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures
Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures Eric J. Eifert Vice President, Cyber Defense Division ManTech s Mission, Cyber, & Technology Solutions Presentation Overview
FORENSIC ANALYSIS Aleš Padrta
FORENSIC ANALYSIS Aleš Padrta CESNET, CESNET-CERTS, FLAB CESNET Czech NREN operator CESNET-CERTS 2004 Established 2008 Accredited CSIRT FLAB Forensic LABoratory Established 6/2011 Support team for CESNET-CERTS
Redline User Guide. Release 1.14
Redline User Guide Release 1.14 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of their respective
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Y R O. Memory Forensics: A Volatility Primer M E M. Mariano Graziano. Security Day - Lille1 University January 2015 - Lille, France
emory Forensics: A Volatility Primer ariano Graziano Security Day - Lille1 University January 2015 - Lille, France whoami Ph.D student at urecom (France) sc from Politecnico di Torino (Italy) ain topics:
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
Digital Forensic Tool for Decision Making in Computer Security Domain
Digital Forensic Tool for Decision Making in Computer Security Domain S. K. Khode 1,V. N. Pahune 2 and M. R. Sayankar 3 1, 2, 3 Computer Engineering Department of Bapurao Deshmukh College of Engineering,
Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security Researcher @memfors4all #RSAC
SESSION ID: ANF-T09 Detecting Unknown Malware: Security Analytics & Memory Forensics Fahad Ehsan Cyber Security Researcher @memfors4all Where it all Started ------------------------------------------------------------------------------------------
DoD Cyber Crime Center
DoD Cyber Crime Center (DC3) Digital Forensics Challenge 2013 Team Northrop Grumman April 30, 2014 Jesse Mayer Northrop Grumman Cyber Security Operations Center DC3 Digital Forensics Challenge Annual Competition
F-Secure Internet Security 2014 Data Transfer Declaration
F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3
FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI
FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI DISCLAIMER: THE VIEWS AND OPINIONS EXPRESSED IN THIS PRESENTATION ARE THOSE OF THE AUTHOR S AND DOES NOT NECESSARILY REPRESENT THE
using memory dumps in digital forensics
SAM STOVER AND MATT DICKERSON using memory dumps in digital forensics Stover is an independent security researcher with experience in network- and host-based forensics. [email protected] Matt Dickerson
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Setup and Analysis of ZeuS Banking Trojan V 2.0.8.9 w/ Volatility and LibVMI in a Virtualized Lab
Setup and Analysis of ZeuS Banking Trojan V 2.0.8.9 w/ Volatility and LibVMI in a Virtualized Lab by Philip Schwartz, with guidance from Dr. Irfan Ahmed University of New Orleans August 5, 2014 I. Introduction
Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE
Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE Who am I? Michael Boman, Malware Researcher Malware Research Institute Provide the community with knowledge and tools Detecting
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Persistence Mechanisms as Indicators of Compromise
Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October
This report is a detailed analysis of the dropper and the payload of the HIMAN malware.
PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware
Windows Rootkit Overview
WHITE PAPER: SYMANTEC SECURITY RESPONSE Windows Rootkit Overview White Paper: Symantec Security Response Windows Rootkit Overview Contents Introduction...4 User Mode Rootkits...4 Kernel Mode Rootkits...5
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Volatile Memory Acquisition via Warm Boot Memory Survivability
Volatile Memory Acquisition via Warm Boot Memory Survivability Timothy Vidas Carnegie Mellon University [email protected] Abstract As with other areas of digital forensics the validity and in some cases the
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
ENISA TRAINING. Tentative agenda for workshop. Supported and co- organised by: TLP WHITE JANUARY 2016
ENISA TRAINING Tentative agenda for workshop Supported and co- organised by: TLP WHITE JANUARY 2016 www.enisa.europa.eu European Union Agency For Network And Information Security Tentative agenda for the
egambit Forensic egambit, your defensive cyber-weapon system. You have the players. We have the game.
egambit Forensic egambit, your defensive cyber-weapon system. You have the players. We have the game. TEHTRI-Security 2010-2015 www.tehtri-security.com Forensic with egambit In this document, we will introduce
EVTXtract. Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, 2013. Mandiant Corporation. All rights reserved.
EVTXtract Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, 2013 What do we have here today? A technical presentation on a novel forensic technique for recovering past
Impact of Digital Forensics Training on Computer Incident Response Techniques
Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,
Adi Hayon Tomer Teller
Adi Hayon Tomer Teller Why are we here? (one of many reasons) A malicious program: Allocates memory in a remote process (and write to it) Executes the code in that memory region Frees the code Memory dump
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook
Deep Discovery. Technical details
Deep Discovery Technical details Deep Discovery Technologies DETECT Entry point Lateral Movement Exfiltration 360 Approach Network Monitoring Content Inspection Document Emulation Payload Download Behavior
Techniques and Tools for Recovering and Analyzing Data from Volatile Memory
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Techniques
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
Penetration Test Methodology on Information-Security Product Utilizing the Virtualization Technology
Penetration Test Methodology on Information-Security Product Utilizing the Virtualization Technology JungDae Kim ([email protected]) ByongKi Park ([email protected]) CONTENTS 1 Background Information 2 Vulnerability
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats Jody C. Patilla The Johns Hopkins University Session ID: TECH-107 Session Classification: Intermediate Objectives Get more out
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Q-CERT Workshop. Matthew Geiger [email protected]. 2007 Carnegie Mellon University
Memory Analysis Q-CERT Workshop Matthew Geiger [email protected] 2007 Carnegie Mellon University Outline Why live system forensics? Previous techniques Drawbacks and new thinking Approaches to memory acquisition
Security Forensics Training
Security Forensics Training Vision, Mission, and Values 3 Vision: To be the brand of choice for computer forensics, cyber security, and training solutions Mission: To provide digital forensics, cyber
Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC
WHITE PAPER Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC www.openioc.org OpenIOC 1 Table of Contents Introduction... 3 IOCs & OpenIOC... 4 IOC Functionality... 5
Computing forensics: a live analysis
April 18th, 2005 1 2 3 Objectives Evidence acquisition Recovery and examination of suspect digital evidence (think Warrick Brown on CSI) Hardware: servers, workstations, laptops, PDAs, mobiles, cameras
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Evolving Threat Landscape
Evolving Threat Landscape Briefing Overview Changing Threat Landscape Profile of the Attack Bit9 Solution Architecture Demonstartion Questions Growing Risks of Advanced Threats APT is on the rise 71% increase
GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide. EnCase Cybersecurity. Complement Guide
GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide EnCase Cybersecurity Complement Guide GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide To truly secure an enterprise, a comprehensive approach
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
Digital Forensics and Cyber Crime Datamining
Journal of Information Security, 2012, 3, 196-201 http://dx.doi.org/10.4236/jis.2012.33024 Published Online July 2012 (http://www.scirp.org/journal/jis) Digital Forensics and Cyber Crime Datamining K.
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Freeware Live Forensics tools evaluation and operation tips
Freeware Live Forensics tools evaluation and operation tips Ricci IEONG, Principal Consultant, ewalker Consulting Ltd Abstract Highlighted by a digital forensics investigation specialists from FBI in DFRWS
AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)
AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents
Securing Secure Browsers
Securing Secure Browsers SESSION ID: TRM-T11 Prashant Kumar Verma Sr. Consultant & Head (Security Testing) Paladion Networks @prashantverma21 Agenda Browser Threats Secure Browsers to address threats Secure
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
Getting Started with HC SharePoint Module
Getting Started with HC SharePoint Module HOSTING CONTROLLER WWW.HOSTINGCONROLLER.COM HOSTING CONTROLLER Contents Introduction... 1 Minimum System Requirements for SharePoint 2013... 1 Hardware Requirements
Comodo Cleaning Essentials Software Version 2.5
Comodo Cleaning Essentials Software Version 2.5 User Guide Guide Version 2.5.071712 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Cleaning
McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
Online Payments Threats
July 3, 2012 Introduction...2 Tested Products...2 Used Configuration...3 Real Malware Inspiration...3 Total Scores Chart...4 Conclusion...4 About matousec.com...4 Detailed Descriptions of Tests...5 Detailed
Malware Hunting with the Sysinternals Tools
SESSION ID: HTA-T07R Malware Hunting with the Sysinternals Tools Mark Russinovich CTO, Microsoft Azure Microsoft @markrussinovich When combining the results from all four AV engines, less than 40% of the
Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile
Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile Even before being acquired by Microsoft in 2011, Skype had already established a strong presence in the VoIP and instant messaging
CMPS223 Final Project Virtual Machine Introspection Techniques
CMPS223 Final Project Virtual Machine Introspection Techniques Michael Sevilla University of California, Santa Cruz [email protected] December 4, 2012 1 Introduction This work is a survey of Virtual
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
Evidentiary Integrity for Incident Response (EIIR)
CYBER SECURITY DIVISION 2014 PRINCIPAL INVESTIGATORS MEETING Evidentiary Integrity for Incident Response (EIIR) Exelis Inc., Information Systems December 2014 This material is based on research sponsored
