ºÝºÝߣshows by User: jared703 / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: jared703 / Thu, 27 Jul 2017 17:59:12 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: jared703 Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors /slideshow/memory-forensics-for-ir-leveraging-volatility-to-hunt-advanced-actors/78319905 bsidesnola-170727175912
This presentation outlined how performing memory forensics on a single memory image broke open an extremely large intrusion in the non-profit space. Tools, techniques and procedures (TTP’s) of an advanced actor intrusion will be highlighted during a technical deep-dive of memory analysis and related workflow. ]]>

This presentation outlined how performing memory forensics on a single memory image broke open an extremely large intrusion in the non-profit space. Tools, techniques and procedures (TTP’s) of an advanced actor intrusion will be highlighted during a technical deep-dive of memory analysis and related workflow. ]]>
Thu, 27 Jul 2017 17:59:12 GMT /slideshow/memory-forensics-for-ir-leveraging-volatility-to-hunt-advanced-actors/78319905 jared703@slideshare.net(jared703) Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors jared703 This presentation outlined how performing memory forensics on a single memory image broke open an extremely large intrusion in the non-profit space. Tools, techniques and procedures (TTP’s) of an advanced actor intrusion will be highlighted during a technical deep-dive of memory analysis and related workflow. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsidesnola-170727175912-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation outlined how performing memory forensics on a single memory image broke open an extremely large intrusion in the non-profit space. Tools, techniques and procedures (TTP’s) of an advanced actor intrusion will be highlighted during a technical deep-dive of memory analysis and related workflow.
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors from Jared Greenhill
]]>
2200 5 https://cdn.slidesharecdn.com/ss_thumbnails/bsidesnola-170727175912-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-jared703-48x48.jpg?cb=1544901708 Information security professional with expertise in malware analysis, digital forensics, intrusion analysis/investigations, computer network defense and security research in both the public and private sector.