Pluralsight - Getting Started with Windows Memory Forensics by Corey Charles
File List
- 1. Allocating Windows Objects and Pool/1. Systems Overview.mp4 7.4 MB
- 1. Allocating Windows Objects and Pool/2. Data Structures.mp4 6.7 MB
- 2. Processing Memory Internals/1. Preserving the Digital Environment.mp4 6.5 MB
- 1. Allocating Windows Objects and Pool/3. The Volatility Framework.mp4 5.4 MB
- 3. Hunting Malware in Process Memory/9. PE Files.mp4 3.6 MB
- getting-started-windows-memory-forensics.zip 3.4 MB
- 2. Processing Memory Internals/6. Remote Acquisition.mp4 3.2 MB
- 2. Processing Memory Internals/3. Atomicity.mp4 3.2 MB
- 3. Hunting Malware in Process Memory/3. Finding Text on Notepads Heap.mp4 2.9 MB
- 3. Hunting Malware in Process Memory/1. Process Environment Block.mp4 2.8 MB
- 3. Hunting Malware in Process Memory/4. Environment Variables.mp4 2.5 MB
- 1. Allocating Windows Objects and Pool/0. Collecting Volatile Data.mp4 2.5 MB
- 0. Course Overview/0. Course Overview.mp4 2.4 MB
- 3. Hunting Malware in Process Memory/5. Attacks on Environment Variables.mp4 2.4 MB
- 2. Processing Memory Internals/2. The Risk of Acquisition.mp4 2.3 MB
- 2. Processing Memory Internals/4. Physical and Virtual Memory.mp4 2.0 MB
- 3. Hunting Malware in Process Memory/2. Data Structures.mp4 2.0 MB
- 2. Processing Memory Internals/5. Local Aquisition.mp4 2.0 MB
- 3. Hunting Malware in Process Memory/7. DLL.mp4 1.7 MB
- 3. Hunting Malware in Process Memory/8. How DLLs Are Loaded.mp4 1.5 MB
- 4. Course Wrap Up/0. Course Wrap Up.mp4 1.4 MB
- 3. Hunting Malware in Process Memory/0. Hunting Malware in Process Memory.mp4 1.2 MB
- 2. Processing Memory Internals/0. Memory Acquisition.mp4 1.2 MB
- 3. Hunting Malware in Process Memory/10. Code Injection.mp4 1.1 MB
- 4. Course Wrap Up/1. Processing Memory Internals Wrap Up.mp4 1.1 MB
- 4. Course Wrap Up/2. Hunting Malware in Process Memory Wrap Up.mp4 1.0 MB
- 3. Hunting Malware in Process Memory/6. Standard Handles.mp4 980.0 KB
- 2. Processing Memory Internals/7. Runtime Interrogation.mp4 595.8 KB
- 1. Allocating Windows Objects and Pool/1. Systems Overview.srt 9.1 KB
- 1. Allocating Windows Objects and Pool/2. Data Structures.srt 9.0 KB
- 2. Processing Memory Internals/1. Preserving the Digital Environment.srt 7.3 KB
- 1. Allocating Windows Objects and Pool/3. The Volatility Framework.srt 5.9 KB
- 3. Hunting Malware in Process Memory/9. PE Files.srt 4.1 KB
- 2. Processing Memory Internals/6. Remote Acquisition.srt 3.9 KB
- 3. Hunting Malware in Process Memory/1. Process Environment Block.srt 3.6 KB
- 3. Hunting Malware in Process Memory/4. Environment Variables.srt 3.2 KB
- 3. Hunting Malware in Process Memory/3. Finding Text on Notepads Heap.srt 2.9 KB
- 2. Processing Memory Internals/3. Atomicity.srt 2.8 KB
- 3. Hunting Malware in Process Memory/2. Data Structures.srt 2.7 KB
- 2. Processing Memory Internals/2. The Risk of Acquisition.srt 2.6 KB
- 3. Hunting Malware in Process Memory/5. Attacks on Environment Variables.srt 2.4 KB
- 2. Processing Memory Internals/5. Local Aquisition.srt 2.4 KB
- 1. Allocating Windows Objects and Pool/0. Collecting Volatile Data.srt 2.3 KB
- 2. Processing Memory Internals/4. Physical and Virtual Memory.srt 2.2 KB
- 3. Hunting Malware in Process Memory/7. DLL.srt 2.1 KB
- 0. Course Overview/0. Course Overview.srt 1.8 KB
- 4. Course Wrap Up/0. Course Wrap Up.srt 1.7 KB
- 2. Processing Memory Internals/0. Memory Acquisition.srt 1.5 KB
- 4. Course Wrap Up/1. Processing Memory Internals Wrap Up.srt 1.4 KB
- 3. Hunting Malware in Process Memory/8. How DLLs Are Loaded.srt 1.4 KB
- 4. Course Wrap Up/2. Hunting Malware in Process Memory Wrap Up.srt 1.3 KB
- content.txt 1.3 KB
- 3. Hunting Malware in Process Memory/10. Code Injection.srt 1.2 KB
- 3. Hunting Malware in Process Memory/6. Standard Handles.srt 1.1 KB
- 3. Hunting Malware in Process Memory/0. Hunting Malware in Process Memory.srt 1.1 KB
- 2. Processing Memory Internals/7. Runtime Interrogation.srt 797 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.