Verkkoarkiston aineisto on saatavilla vain vapaakappaletyöasemilla. Katso infosta lisää tietoa verkkoarkiston käytöstä.

SuomeksiPå svenskaIn English

Materiaali saatavilla vain vapaakappaletyöasemilla

[Disobey 2020] Live Memory Attacks and Forensics - Ulf Frisk

Disobey

Disobey: https://disobey.fi/ Follow us on twitter: https://twitter.com/disobey_fi The PCILeech direct memory access attack toolkit has become the defacto standard for PCIe DMA attacks amongst researchers, red teamers, governments and game cheaters alike. We will demo how to take total control of still vulnerable systems with PCIe DMA code injection using affordable FPGA hardware. MemProcFS - The Memory Process File System is memory forensics made super easy! Analyze memory dumps or live memory by clicking on files in a virtual file system using your favorite tools. Analyze and modify live memory using PCILeech PCIe hardware devices or even memory acquired from remote hosts - live over the network. MemProcFS is 100% open source memory forensics, blazingly fast and super easy to use! Ulf Frisk (Twitter: https://twitter.com/UlfFrisk) Ulf is a pentester by day, and a Security Researcher by night. He is the author of the PCILeech direct memory access attack toolkit and the Memory Process File System. He is interested in things low-level and primarily focuses on Memory Analysis and Direct Memory Access (DMA). Twitter: @UlfFrisk

#disobey #disobey2020 #PCILeech

Keräyksessä Tietoturva 2020-2021

Alkuperäislähde: https://www.youtube.com/watch?v=mca3rLsHuTA


Sivun kuvailutiedot ovat peräisin alkuperäislähteestä (YouTube).