-
Acquiring Linux Memory using AVML and Using it with Volatility | B!n@ry
This is another quick post going over the process to acquire memory from a Linux system, but instead of using LiME, I’m going to use AVML which stands for Acquire Volatile Memory for Linux, and could ...
-
Virtualization | B!n@ry
Just thought of writing this here, because I keep forgetting how to do this stuff! Also, since OST2 has lots of new courses related to Windbg, I thought this would be helpful for folks who use a Linux...
-
Forensics | B!n@ry
Hello, I’ve been invited by the Saudi Federation for Cyber Security and Programming (SAFCSP) to do a Linux Forensics workshop during their series of Cybersecurity Nights. My session will be next Thurs...
-
Windows | B!n@ry
-
Digital Forensic Investigations | B!n@ry
2. AccessData FTK Toolkit, http://www.accessdata.com/
3. AccessData FTK Imager, http://www.accessdata.com/
4. ProDiscover, http://www.techpathways.com/prodiscoverdft.htm
5. WinHex, http://www.x-w...
-
ThreatHunting | B!n@ry
Before diving into this post, I wanted to say, that I have been teaching digital forensics for a long time by now, and in my Operating System Forensics class, I use Eric Zimmerman‘s tools a lot, and w...