Arkiverat nätmaterial tillgänglig på dataterminaler för friexemplar på friexemplarsbibliotekens lokaler. Mer info på info sidan.

SuomeksiPå svenskaIn English

Materialet tillgänglig endast på friexemplarsstationer

[Disobey 2020] Live Memory Attacks and Forensics - Ulf Frisk

Disobey

Disobey: https://disobey.fi/ Follow us on twitter: https://twitter.com/disobey_fi The PCILeech direct memory access attack toolkit has become the defacto standard for PCIe DMA attacks amongst researchers, red teamers, governments and game cheaters alike. We will demo how to take total control of still vulnerable systems with PCIe DMA code injection using affordable FPGA hardware. MemProcFS - The Memory Process File System is memory forensics made super easy! Analyze memory dumps or live memory by clicking on files in a virtual file system using your favorite tools. Analyze and modify live memory using PCILeech PCIe hardware devices or even memory acquired from remote hosts - live over the network. MemProcFS is 100% open source memory forensics, blazingly fast and super easy to use! Ulf Frisk (Twitter: https://twitter.com/UlfFrisk) Ulf is a pentester by day, and a Security Researcher by night. He is the author of the PCILeech direct memory access attack toolkit and the Memory Process File System. He is interested in things low-level and primarily focuses on Memory Analysis and Direct Memory Access (DMA). Twitter: @UlfFrisk

#disobey #disobey2020 #PCILeech


I insamlingen Tietoturva 2020-2021

Ursprungskälla: https://www.youtube.com/watch?v=mca3rLsHuTA


Sidans beskrivning är från den ursprungliga källan (YouTube).