Skip to main content

Section outline

    • Live Memory Acquisition & Malware Detection
    • Advanced Memory Analysis using Volatility
    • Threat Hunting Techniques:
      • Shimcache, Amcache, Shellbags, Ntuser.dat, MFT, MRU
      • Identifying Rogue Processes, Code Injection, and Network Artifacts
    • Windows Exploitation & Post-Exploitation:
      • Finding Persistent Malware Beacons & LOLBAS Attacks
      • PowerShell Event Analysis & Remote Execution Techniques