Содержание
Course Overview 1m 14s Course Overview 1m 14sAllocating Windows Objects and Pool 16m 17s Collecting Volatile Data 1m 18s Systems Overview 5m 45s Data Structures 5m 38s The Volatility Framework 3m 35sProcessing Memory Internals 14m 31s Memory Acquisition 56s Preserving the Digital Environment 4m 27s The Risk of Acquisition 1m 35s Atomicity 1m 45s Physical and Virtual Memory 1m 25s Local Aquisition 1m 26s Remote Acquisition 2m 26s Runtime Interrogation 28sHunting Malware in Process Memory 18m 0s Hunting Malware in Process Memory 42s Process Environment Block 2m 23s Data Structures 1m 51s Finding Text on Notepads Heap 1m 57s Environment Variables 2m 6s Attacks on Environment Variables 1m 55s Standard Handles 42s DLL 1m 20s How DLLs Are Loaded 1m 8s PE Files 3m 0s Code Injection 51sCourse Wrap Up 2m 44s Course Wrap Up 1m 1s Processing Memory Internals Wrap Up 52s Hunting Malware in Process Memory Wrap Up 50s