πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Memory Forensics

Focus Area: 🚨 Incident Response
19
Total Entries
15
Contributors

Top Contributors

Monnappa K A(4) Aashish Kunte(2) Amol Sarwate(1) Himanshu Anand(1) K K Mookhey(1)

All Entries (19 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2023-10-13TalkHackfest Exploring RAM Forensic Analysis for Effective Digital Investigations Video Sneha Banerjee#forensics#memory-forensics#digital-forensics+2
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvam#red-teaming#linux#memory-forensics+2
2023-06-01TalkSecurityfest Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#reverse-engineering#appsec#endpoint-protection+4
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singh#incident-management#digital-forensics#forensics+3
2019-10-12TalkTexascybersummit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+3
2019-03-28TalkBlackhat Investigating Malware Using Memory Forensics - A Practical Approach Presentation Video Monnappa K A#forensics#blueteam#malware-detection+1
2018-10-05TalkC0c0n Using Fault Injection for Forensics Yashin Mehaboobe#forensics#digital-forensics#security-testing+2
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K A#code-injection#red-teaming#malware-research+4
2016-10-05TalkVirusbulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#incident-management#endpoint-protection+3
2016-08-19TalkC0c0n SSD Forensics : A Nightmare for Forensic Investigators Santosh Khadsare#forensics#memory-forensics#incident-management+2
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-02-06TalkNullcon Generic Executable Unpacking using Dynamic Binary Instrumentation Presentation Shubham Bansal#blueteam#dynamic-binary-instrumentation#executable-analysis+1
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K A#forensics#blueteam#memory-forensics+2
2014-09-18TalkAppsecusa Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwate#reverse-engineering#memory-forensics#incident-management
2012-09-29TalkNullcon Next-gen Forensics K K Mookhey#forensics#digital-forensics#incident-management+2
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunte#forensics#blueteam#digital-forensics+3
2011-10-07TalkC0c0n Digital Evidence Sushanth Samudrala#forensics#digital-forensics#incident-management+2
2010-12-04TalkClubhack Windows Memory Forensic Analysis Presentation Aashish Kunte#windows#forensics#memory-forensics+3
2009-11-17TalkSecuritybyte Behind the scenes at the MSRC Presentation Suresh Venkateswaran, Dave Midturi#incident-management#forensics#memory-forensics+1