Wednesday, August 27, 2014

Volatility 2.4 at Blackhat Arsenal - Reverse Engineering Rootkits

This video demonstrates how you can leverage Volatility and memory forensics to detect kernel rootkits, assist with reverse engineering, and use the results for developing additional indicators.

The video is narrated by Apple's text to speech and you can find the actual text on the Youtube page. The live/in-person demo was given at the @Toolswatch Blackhat Arsenal.

1 comment:

  1. Thanks mhl

    Really useful and informative video, thanks for sharing this.
    So much useful stuff packed into such a concise demo!

    Cheers
    Mark

    ReplyDelete