Threat Hunting DLL-injected C2 Beacons using Memory Forensics | Faan Rossouw

Ойын-сауық

/// 🛝 Slides
www.faanross.com/posts/acm/
For this webcast, we have invited guest speaker Faan Rossouw to discuss his approach to threat hunting.
This talk will explore how we can use live memory analysis (using Process Hacker) to identify diagnostic characteristics of standard -injected C2 beacons. In the first half we will explore the theory underpinning the approach, followed up by a live demo.
Note that this talk forms part of a larger overall approach to threat hunting, which is fully explored in a free hands-on threat-hunting course Faan created specifically for beginners - www.faanross.com/posts/course01/
Join our Threat Hunter Community Discord Server to join in on the conversation during and after the webcast: / discord

Пікірлер: 2

  • @joshuamichau5122
    @joshuamichau51229 ай бұрын

    Super cool presentation. 😀

  • @elpatito2004
    @elpatito20049 ай бұрын

    Good Stuff😁😁

Келесі