March 2022
Intermediate to advanced
304 pages
5h 58m
English
You already know some theory, but as you may know, in essence, there's no difference between theory and practice, but in reality there is. So, let's move on and dive into some practical tasks, starting with Windows memory acquisition, as Windows is the most widely used operating system.
What does it mean? It's the most common target for threat actors! It also means that you will face it very often during your incident response engagements (and some criminal cases, of course). Therefore it's a very good idea to start from learning how to acquire memory from a Windows host.
This chapter will introduce you to the four most common tools used for Windows memory acquisition, and—of course—you'll learn how to ...