Kim Lillåsowningmymistakes.hashnode.dev·Jan 30, 2024Yes, you can damage flash memoryI have been writing a driver and hooking up LittleFs to an external SPI connected flash memory, W25Q32BV from Winbond with 32Mbit of memory with 1024 erasable sectors. It worked well, I could write and read data and the file system was working just f...memory forensics
Gunjan Mehtagunjanmehta01.hashnode.dev·Dec 20, 2023Day 19 of Advent of Cyber 2023!Backstory: In the bustling hub of Santa's Security Operations Centre (SSOC), Log McBlue flags a potential insider threat emanating from a Linux database server during routine network traffic analysis. Taking decisive action, Forensic McBlue promptly ...memory forensics
cpuucpuu.hashnode.dev·Nov 5, 2023How to Perform Memory Forensic Analysis in macOS Using Volatility 3Introduction Memory forensic analysis is an intricate and challenging aspect of cybersecurity, one that becomes increasingly crucial as cyber threats evolve. In earlier discussions, I introduced the installation of Volatility 3, a cutting-edge tool i...322 readsMemory Forensicsmemory forensics
cpuucpuu.hashnode.dev·Feb 16, 2023How to Perform Memory Forensic Analysis in Linux Using Volatility 3Introduction In a prior blog entry, I presented Volatility 3 and discussed the procedure for examining Windows 11 memory. In the current post, I shall address memory forensics within the context of the Linux ecosystem. Linux Memory Dump Acquisition E...8.4K readsMemory Forensicsmemory forensics
cpuucpuu.hashnode.dev·Feb 9, 2023How to Perform Memory Forensic Analysis in Windows 11 Using Volatility 3Introduction I already explained the memory forensics and volatility framework in my last article. In this post, I will cover a tutorial on performing memory forensic analysis using volatility in a Windows 11 environment. Windows 11 Memory Dump Acqui...7.4K readsMemory Forensicsmemory forensics
cpuucpuu.hashnode.dev·Feb 2, 2023[Book Review] Practical Memory ForensicsSvetlana Ostrovskaya, Oleg Skulkin, "Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory", Packt Publishing, 2022 Introduction In this post, I will be providing a comprehensive review of a fascinating book on memory f...174 readsMemory Forensicsmemory forensics
cpuucpuu.hashnode.dev·Jan 26, 2023An Introduction to Volatility 3 and Installation GuideIntroduction Forensic experts are frequently summoned in the aftermath of a security breach or to ascertain whether an incident has transpired. Their primary objective is to obtain a snapshot of the compromised system's RAM to capture cryptographic k...1 like·18.3K readsMemory Forensicsmemory forensics
cpuucpuu.hashnode.dev·Jan 19, 2023[Book Review] The Art of Memory ForensicsMichael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters, "The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory 1st Edition", Wiley, 2014 Introduction In this blog post, I will be reviewing the comprehensive g...177 readsMemory Forensicsbook review