
In this video, FOR532: Enterprise Memory Forensics In-Depth course author Mathias Fuchs provides an overview of how memory forensics has been done in the past and how you can utilize many of the same tactics for the large-scale breaches of today.
About FOR532: Enterprise Memory Forensics In-Depth
Memory forensics ties into many disciplines in cyber investigations. From classical law enforcement investigations that focus on user artifacts through malware analysis to large-scale hunting, memory forensics has several applications that for many teams are still unknown territory. The FOR532 Enterprise Memory Forensics In-Depth class strives to change that and significantly speed up your incident response, your threat hunting, and your malware analysis. Visit the course page (www.sans.org/FOR532) to learn more
About Mathias Fuchs
Mathias began his career teaching Linux administration and general IT security and quickly moved into penetration testing and red teaming. As his skills improved (and as breaking into customer systems got more repetitive and less demanding), Mathias sought new challenges that would expand his IT security acumen. So, he moved over to digital forensics and incident response, a field where the attacker unintentionally sets the pace and partly controls what an investigator needs to do - rather than that being dictated by the customer or the investigator.