Georges-James Duchamp De La Trufinière
Coffee maker
Brian
Memory Forensic response team
RAM
Processes
CPU
Disk
Memory acquisition
Memory analysis
Dumping the memory of a target machine to disk
Analysing the memory dump for finding forensics artifacts
Usefull tools
Memory analysis
We should look at :
Checklist :
Example :
ECSC forensics challenge : "3615 Incident"
Mission : Find the ransomware, its PID and the name of the encrypted file.