{"id":14981,"date":"2024-02-22T02:58:23","date_gmt":"2024-02-22T02:58:23","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/"},"modified":"2024-02-29T03:22:59","modified_gmt":"2024-02-29T03:22:59","slug":"workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/","title":{"rendered":"A Crash Course on Hunting Malware from the Dark Corners of Memory"},"content":{"rendered":"<h4><strong><span style=\"color: #993300\">ATTEND IN-PERSON<\/span>: <\/strong><strong>Onsite at Abu Dhabi<\/strong><\/h4>\n<h4><strong>DATE: 28 November 2024<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 GST\/GMT+4<\/strong><\/h4>\n<hr \/>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<h5 class=\"column\">The number of cyber attacks is undoubtedly on the rise targeting government, military, public, and private sectors. Most of these cyber attacks use malicious programs (malware) for financial theft, espionage, intellectual property theft, and political motives. These malware programs use various techniques to execute their malicious code and to remain undetected from the security products. With adversaries getting sophisticated and carrying out advanced malware attacks, it is critical for cybersecurity professionals to detect, hunt and respond to such attacks.<\/h5>\n<div class=\"column\">\n<p>Memory forensics is a powerful investigation\/threat-hunting technique used in digital forensics and incident response. It has become a must-have skill for fighting advanced malware, targeted attacks, and security breaches. This training focuses on hunting malware using memory forensics, it introduces you to the topic of Windows internals and techniques to perform malware and Rootkit investigations. The training covers analysis and investigation of various malware infected memory images(crimewares, APT malwares, Rootkits, etc.) and contains scenario-based hands-on labs to gain a better understanding of the subject.The training provides practical guidance and attendees should walk away with the following skills:<\/p>\n<p>&#8211; Ability to acquire a memory image from suspect\/infected systems<br \/>\n&#8211; How to use open source advanced memory forensics framework (Volatility)<br \/>\n&#8211; Understanding of the techniques used by the malwares to hide from Live forensic tools<br \/>\n&#8211; Understanding of the techniques used by Rootkits(code injection, hooking, etc.)<br \/>\n&#8211; Investigative steps for detecting stealth and advanced malware<br \/>\n&#8211; How memory forensics helps in malware analysis and reverse engineering<br \/>\n&#8211; How to incorporate malware analysis and memory forensics in the sandbox<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div><\/div>\n<div>\n<h5><strong>Topics Covered<\/strong><\/h5>\n<p><strong>Introduction to Memory Forensics<\/strong><br \/>\n&#8211; What is Memory Forensics<br \/>\n&#8211; Why Memory Forensics<br \/>\n&#8211; Steps in Memory Forensics<br \/>\n&#8211; Memory acquisition and tools<br \/>\n&#8211; Acquiring memory From physical machine<br \/>\n&#8211; Acquiring memory from virtual machine<br \/>\n&#8211; The hands-on exercise involves acquiring the memory<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Volatility Overview<\/strong><br \/>\n&#8211; Introduction to Volatility Advanced Memory Forensics Framework<br \/>\n&#8211; Volatility Installation<br \/>\n&#8211; Volatility basic commands<br \/>\n&#8211; Determining the profile<br \/>\n&#8211; Volatility help options<br \/>\n&#8211; Running the plugin<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Investigating Process<\/strong><br \/>\n&#8211; Understanding Process Internals<br \/>\n&#8211; Process(EPROCESS) Structure<br \/>\n&#8211; Process organization<br \/>\n&#8211; Process Enumeration by walking the double linked list<br \/>\n&#8211; process relationship (parent-child relationship)<br \/>\n&#8211; Understanding DKOM attacks<br \/>\n&#8211; Process Enumeration using pool tag scanning<br \/>\n&#8211; Volatility plugins to enumerate processes<br \/>\n&#8211; Identifying malware process<br \/>\n&#8211; Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Investigating Process handles &amp; Registry<\/strong><br \/>\n&#8211; Objects and handles overview<br \/>\n&#8211; Enumerating process handles using Volatility<br \/>\n&#8211; Understanding Mutex<br \/>\n&#8211; Detecting malware presence using the mutex<br \/>\n&#8211; Understanding the Registry<br \/>\n&#8211; Investigating common registry keys using Volatility<br \/>\n&#8211; Detecting malware persistence<br \/>\n&#8211; Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Investigating Network Activities<\/strong><br \/>\n&#8211; Understanding malware network activities<br \/>\n&#8211; Volatility Network Plugins<br \/>\n&#8211; Investigating Network connections<br \/>\n&#8211; Investigating Sockets<br \/>\n&#8211; Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/p>\n<p><strong>Investigation Process Memory<\/strong><br \/>\n&#8211; Process memory Internals<br \/>\n&#8211; Listing DLLs using Volatility<br \/>\n&#8211; Identifying hidden DLLs<br \/>\n&#8211; Dumping malicious executable from memory<br \/>\n&#8211; Dumping Dll&#8217;s from memory<br \/>\n&#8211; Scanning the memory for patterns(yarascan)<br \/>\n&#8211; Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/p>\n<p><strong>Investigating User Mode Rootkits &amp; Fileless Malwares<\/strong><br \/>\n&#8211; Code Injection<br \/>\n&#8211; Types of Code injection<br \/>\n&#8211; Remote DLL injection<br \/>\n&#8211; Remote Code injection<br \/>\n&#8211; Reflective DLL injection<br \/>\n&#8211; Hollow process injection<br \/>\n&#8211; Demo &#8211; Case Study<br \/>\n&#8211; Hands-on lab exercise(scenario based) involves investigating malware infected memory<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Investigating Kernel-Mode Rootkits<\/strong><\/p>\n<p>&#8211; Understanding Rootkits<br \/>\n&#8211; Understanding Functional call traversal in Windows<br \/>\n&#8211; Level of Hooking\/Modification on Windows<br \/>\n&#8211; Kernel Volatility plugins<br \/>\n&#8211; Hands-on lab exercise(scenario-based) involves investigating malware infected memory<br \/>\n&#8211; Demo &#8211; Rootkit Investigation<\/p>\n<p><strong>Memory Forensic Case Studies<\/strong><br \/>\n&#8211; Demo<br \/>\n&#8211; Hunting an APT malware from Memory<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>ATTEND IN-PERSON: Onsite at Abu Dhabi DATE: 28 November 2024 TIME: 09:00 to 17:00 GST\/GMT+4 The number of cyber attacks is undoubtedly on the rise targeting government, military, public, and private sectors. Most of these cyber attacks use malicious programs (malware) for financial theft, espionage, intellectual property theft, and political motives. These malware programs use [&hellip;]<\/p>\n","protected":false},"featured_media":14980,"template":"","meta":{"_acf_changed":false},"product_cat":[89,90,57,91,94,87],"product_tag":[],"class_list":{"0":"post-14981","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-1-day-workshop","7":"product_cat-auh2024","8":"product_cat-in-person","9":"product_cat-workshop-2","10":"product_cat-28-nov-workshop-auh2024","11":"product_cat-auh2024-workshop","13":"first","14":"outofstock","15":"featured","16":"shipping-taxable","17":"purchasable","18":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Crash Course on Hunting Malware from the Dark Corners of Memory - HITBSecConf2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Crash Course on Hunting Malware from the Dark Corners of Memory - HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"ATTEND IN-PERSON: Onsite at Abu Dhabi DATE: 28 November 2024 TIME: 09:00 to 17:00 GST\/GMT+4 The number of cyber attacks is undoubtedly on the rise targeting government, military, public, and private sectors. Most of these cyber attacks use malicious programs (malware) for financial theft, espionage, intellectual property theft, and political motives. These malware programs use [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-29T03:22:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Monappa-Training.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/\",\"name\":\"A Crash Course on Hunting Malware from the Dark Corners of Memory - HITBSecConf2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Monappa-Training.jpg\",\"datePublished\":\"2024-02-22T02:58:23+00:00\",\"dateModified\":\"2024-02-29T03:22:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Monappa-Training.jpg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Monappa-Training.jpg\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Crash Course on Hunting Malware from the Dark Corners of Memory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\",\"name\":\"HITBSecConf2024 - Abu Dhabi\",\"description\":\"Nov 25 - 28, Abu Dhabi, UAE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Crash Course on Hunting Malware from the Dark Corners of Memory - HITBSecConf2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/","og_locale":"en_US","og_type":"article","og_title":"A Crash Course on Hunting Malware from the Dark Corners of Memory - HITBSecConf2024 - Abu Dhabi","og_description":"ATTEND IN-PERSON: Onsite at Abu Dhabi DATE: 28 November 2024 TIME: 09:00 to 17:00 GST\/GMT+4 The number of cyber attacks is undoubtedly on the rise targeting government, military, public, and private sectors. Most of these cyber attacks use malicious programs (malware) for financial theft, espionage, intellectual property theft, and political motives. These malware programs use [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/","og_site_name":"HITBSecConf2024 - Abu Dhabi","article_modified_time":"2024-02-29T03:22:59+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Monappa-Training.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/","name":"A Crash Course on Hunting Malware from the Dark Corners of Memory - HITBSecConf2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Monappa-Training.jpg","datePublished":"2024-02-22T02:58:23+00:00","dateModified":"2024-02-29T03:22:59+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Monappa-Training.jpg","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/Monappa-Training.jpg","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/workshop-a-crash-course-on-hunting-malware-from-the-dark-corners-of-memory-auh2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/shop\/"},{"@type":"ListItem","position":3,"name":"A Crash Course on Hunting Malware from the Dark Corners of Memory"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/","name":"HITBSecConf2024 - Abu Dhabi","description":"Nov 25 - 28, Abu Dhabi, UAE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product\/14981"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media\/14980"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media?parent=14981"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product_cat?post=14981"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product_tag?post=14981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}