Hover a category to view courses…
Topics:
RAM structure (heap, stack, kernel memory)
Process trees
Why memory is key in modern IR
Memory acquisition tools
Ensuring integrity
Live IR considerations
Kernel-level acquisition pitfalls
pslist, pstree, netscan, dlllist
Detecting injected code
Memory indicators of credential theft
Investigating malicious processes
Rootkits
Reflective DLL injection
In-memory persistence