The Volatility team will give a talk at the next NYC4SEC meetup on memory forensics on May 8th, 2014 at John Jay College. Make sure to RSVP if you are planning to attend, since there is limited seating!
Thanks For the Memory: Rootkits, Exfil and APT - RAM Conquers All
The ability to perform digital investigations and incident response
is becoming a critical skill for many occupations. Unfortunately,
digital investigators frequently lack the training or experience to take
advantage of the volatile artifacts found in physical memory. Volatile
memory contains valuable information about the runtime state of the
system, provides the ability to link artifacts from traditional forensic
analysis (network, file system, registry), and provides the ability to
ascertain investigative leads that have been unbeknownst to most
analysts. Malicious adversaries have been leveraging this knowledge
disparity to undermine many aspects of the digital investigation process
with such things as anti-forensics techniques, memory resident malware,
kernel rootkits, encryption (file systems, network traffic, etc), and
Trojan defenses. The only way to turn-the-tables and defeat a creative
digital human adversary is through talented analysts.
This talk demonstrates the importance of including Volatile memory in
your investigations with an overview of the most widely used memory
forensics tool, Volatility, by its developers.