home.social

#memoryanalysis — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #memoryanalysis, aggregated by home.social.

  1. @volexity Volcano Server & Volcano One v26.04.27 adds memory analysis for arm64 Windows, memory-only .NET assemblies, SRUM database, Linux systemd units, history & timers from RAM.

    This release also adds detection of AppleScript usage, cleared Windows event logs, AV scanning of files & deployments across AWS accounts.

    Contact us for more information: volexity.com/company/contact/

    #memoryforensics #memoryanalysis #dfir

  2. @volexity Volcano Server & Volcano One v25.02.21 adds 300 new YARA rules; consistent Bash/ZSH history & sessions from Linux/macOS memory and files; and parses Linux systemd journals, macOS unified logs, and Windows USNs (search + timeline for all).

    This release also extracts cmd history from Windows 24H2 RAM; and adds admin options for SAML and S3 bucket watching. 



    For more information about Volcano Server & Volcano One, contact us: volexity.com/company/contact/

    #dfir #memoryforensics #memoryanalysis

  3. 📢 New blog post alert! 📢

    Check out our latest blog post "A Deep Dive into Penetration Testing of macOS Applications (Part 2)"! 🕵️‍♀️🖥️🔍

    In this post, we discuss code signing mechanisms, code signature flags, and file and memory analysis techniques and tools. 💻🔒💡

    Learn how to identify potential vulnerabilities and strengthen your macOS application security! 💪

    Read the full article here: cyberark.com/resources/threat-

    #macOS #cybersecurity #pentesting #infosec #blogpost #appsecurity #hardenedruntime #entitlements #fileanalysis #memoryanalysis #securityresearch

  4. CW: Cross-posted from LinkedIn: Study/Learning/Classes

    Since I started my #MSISE with SANS, I have taken some GREAT classes and learned so much, but THIS class is one of the top two I’ve been looking forward to the most (the other being FOR610/GREM planned for this summer)!

    I am so excited to get started on #FOR508 - Advanced #IncidentResponse, #ThreatHunting, and #DigitalForensics- and prepare for my #GCFA this Spring!

    Since Thanksgiving, I’ve also been working my way through a backlog of technical books I have, occasionally reference, but never dove into completely. I’m remedying that this year and made a promise to myself to sit down and read/work through my bookshelf. I can say that I’m already seeing the benefits of that effort, unlocking a few “a ha!” moments and further helping me refine my future professional plans.

    When I took my first security class years ago, I immediately fell in love with the field. I knew I needed to do this with my career. I have found that feeling again in the last quarter as I spend more time studying #memoryanalysis and #reverseengineering. I took a really nontraditional path into these disciplines, and I have a lot of gaps in knowledge I’m constantly filling in, but I *love* learning this stuff.

    Over 2/3 of the way through my masters…. The academic end is in sight, but the learning opportunities are infinite :)