MENU

Posts Tagged ‘Virtual’

Most Recent
 
Read More
2017-09-26

A Hypervisor as a Basis for a Sandbox

We hope that this article will be useful to you. In this post, two topics will be considered from the theoretical and practical point of view. The author is going to talk with heise devSec (and IT-SECX and DefCamp) about confusing binary files for developers, and therefore wants to test various approaches to applications with fusion versions. Fuzzing is a very important concept at design time, and so all developers should know how to do it correctly and that this setting can be simple and fast.

84
 
Read More
2017-08-17

Virtual Machines Memory Forensics

Jason Hale talks about Memory Acquisition and Virtual Secure Fashion. «Physical memory is commonly acquired using a software-based memory acquisition tool such as winpmem, DumpIt, Magnet RAM Capturer, FTK Imager, or one of the several other options available. These tools typically load a device driver into the kernel and subsequently read memory through mapping the \\Device\PhysicalMemory object, using a function such as MmMapIoSpace, or directly manipulating the page tables. Many of these tools also share a similar trait: their use on a system with virtual secure mode enabled results in a system crash.».

487
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.