Practical Memory Analysis for Incident Response

Brrcon 2017

Presented by: Dan Cao, Ryan Eikanger
Date: Tuesday June 23, 2015
Time: 10:00 - 15:50
Location: Workshop 1

NOTE Separate registration required.

OVERVIEW

Analysts in the class will be taught practical memory analysis by learning about common memory structures and acquisition; Identifying rogue or hidden processes, lateral network movement, and interesting process strings; extracting artifacts of interest for Incident Response utilizing tools such as bulk_extractor, Volatility and Rekall.

REQUIREMENTS

Please note: It is necessary to fully update your host operating system prior to the class to ensure you have the right drivers and patches installed to utilize the latest USB 3.0 devices. Those who use a Linux host must also be able to access ExFAT partitions using the appropriate kernel or FUSE modules.

Dan Cao

Dan Cao is an Incident Handler on Target’s Cyber Security Incident Response Team. Dan has domain knowledge in Incident Response, Memory Forensics, and Network Forensics. In addition to his passion for Cyber Security, Dan is also passionate about gaming, motorcycles, photography and baseball.

Ryan Eikanger

Ryan Eikanger is an Incident Handler with Target’s Cyber Security Incident Response Team. Ryan specializes in forensics, live response, and memory analysis.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats