Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- + Introduction:
- * Need for memory forensics
- * The components we deal with,
- + Processes.
- + Registry Keys.
- + Connections.
- + Logs.
- + Some Malware artifacts.
- * Various Artifacts.
- * Tools used in memory forensics.
- + Setting up the environment - Linux and Windows.
- + Limitations.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement