| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Ways to Identify Malware on a System This talk will discuss ways to identify malware on a system including initial alerts, such as local endpoint security, IDS, proxy logs, users informing an admin, etc. He will go over Prefetch, certain registry keys,local Internet History/Caches,network related logs, file location, odd looking/out of place files. He will also discuss memory captures (mention tools that do it), perform hands on demo of Volatility, and discuss findings.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast