#cryptology, #cryptography, #cryptanalysis
In this video, you get an introduction to memory forensics. It contains a theoretical part, where you learn about digital forensics and memory forensics. After that, the video contains a practical part, where we extract and then analyze the content of a Windows machine's memory for malware using the memory forensics framework "Volatily 3".
The video is based on a German "test lecture" I gave a some months ago (in 2022). I thought, the introduction could be also interesting for the viewers of this channel (and everyone else interested in digital forensics), so I made a video out of it :-). Thus, this introduction is a translation of that particular lecture I gave.
Tools (links) mentioned in the video:
- Volatility foundation: [ Ссылка ]
- Volatility GitHub repo: [ Ссылка ]
- Kali Linux: [ Ссылка ]
- Belkasoft Live RAM Capturer: [ Ссылка ]
Literature shown at the end of the video:
- Ligh, Michael Hale, et al. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. John Wiley & Sons, 2014.
- Moustafa, Nour. Digital Forensics in the Era of Artificial Intelligence. CRC Press, 2022.
- BSI. Leitfaden IT-Forensik. (German) [ Ссылка ] Version 1.0.1, 2011.
- The „Windows Internals“ books of Mark E. Russinovich and Pavel Yosifovich (and others)
- Interpol. GUIDELINES FOR DIGITAL FORENSICS FIRST RESPONDERS - Best practices for search and seizure. 2021
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: [ Ссылка ]
You can download the latest version of CrypTool 2 from here: [ Ссылка ]
Visit my blog: [ Ссылка ]
Join Discord server: [ Ссылка ]
Ещё видео!