Advertisement
Guest User

Memory Forensics

a guest
Jul 24th, 2014
233
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.29 KB | None | 0 0
  1. + Introduction:
  2. * Need for memory forensics
  3. * The components we deal with,
  4. + Processes.
  5. + Registry Keys.
  6. + Connections.
  7. + Logs.
  8. + Some Malware artifacts.
  9. * Various Artifacts.
  10. * Tools used in memory forensics.
  11. + Setting up the environment - Linux and Windows.
  12. + Limitations.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement