#memoryanalysis — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #memoryanalysis, aggregated by home.social.
-
@volexity Volcano Server & Volcano One v26.04.27 adds memory analysis for arm64 Windows, memory-only .NET assemblies, SRUM database, Linux systemd units, history & timers from RAM.
This release also adds detection of AppleScript usage, cleared Windows event logs, AV scanning of files & deployments across AWS accounts.
Contact us for more information: https://volexity.com/company/contact/
-
Awesome blogpost on how to dump
shmon Linux:https://isc.sans.edu/diary/How+to+collect+memoryonly+filesystems+on+Linux+systems/32432/
-
@volexity Volcano Server & Volcano One v25.02.21 adds 300 new YARA rules; consistent Bash/ZSH history & sessions from Linux/macOS memory and files; and parses Linux systemd journals, macOS unified logs, and Windows USNs (search + timeline for all).
This release also extracts cmd history from Windows 24H2 RAM; and adds admin options for SAML and S3 bucket watching.
For more information about Volcano Server & Volcano One, contact us: https://volexity.com/company/contact/
-
📢 New blog post alert! 📢
Check out our latest blog post "A Deep Dive into Penetration Testing of macOS Applications (Part 2)"! 🕵️♀️🖥️🔍
In this post, we discuss code signing mechanisms, code signature flags, and file and memory analysis techniques and tools. 💻🔒💡
Learn how to identify potential vulnerabilities and strengthen your macOS application security! 💪
Read the full article here: https://www.cyberark.com/resources/threat-research-blog/a-deep-dive-into-penetration-testing-of-macos-applications-part-2
#macOS #cybersecurity #pentesting #infosec #blogpost #appsecurity #hardenedruntime #entitlements #fileanalysis #memoryanalysis #securityresearch
-
CW: Cross-posted from LinkedIn: Study/Learning/Classes
Since I started my #MSISE with SANS, I have taken some GREAT classes and learned so much, but THIS class is one of the top two I’ve been looking forward to the most (the other being FOR610/GREM planned for this summer)!
I am so excited to get started on #FOR508 - Advanced #IncidentResponse, #ThreatHunting, and #DigitalForensics- and prepare for my #GCFA this Spring!
Since Thanksgiving, I’ve also been working my way through a backlog of technical books I have, occasionally reference, but never dove into completely. I’m remedying that this year and made a promise to myself to sit down and read/work through my bookshelf. I can say that I’m already seeing the benefits of that effort, unlocking a few “a ha!” moments and further helping me refine my future professional plans.
When I took my first security class years ago, I immediately fell in love with the field. I knew I needed to do this with my career. I have found that feeling again in the last quarter as I spend more time studying #memoryanalysis and #reverseengineering. I took a really nontraditional path into these disciplines, and I have a lot of gaps in knowledge I’m constantly filling in, but I *love* learning this stuff.
Over 2/3 of the way through my masters…. The academic end is in sight, but the learning opportunities are infinite :)