Dissecting Attack Artifacts!
At some point the c-Champions will need to provide technical resources to the network engineers and stakeholder managers. This section of the Toolkit provides a listing of various cyber threat hunting tools for the technical analysts within stakeholder organizations. Below are a series of hotlinks and short descriptions of digital forensics tools.
–http://memory-analysis.rekall-forensic.com/www/TOC/-Tutorial on Memory Forensics. (Welcome to Rekall Memory Forensics We can remember it for you wholesale! (n.d.). Retrieved December 26, 2016, from http://memory-analysis.rekall-forensic.com/www/TOC/)
–https://digital-forensics.sans.org/media/rekall-memory-forensics-cheatsheet.pdf-Rekall Memory Forensics Cheat Sheet. (Rekall Memory Forensics Cheat Sheet. (n.d.). Retrieved December 26, 2016, from https://digital-forensics.sans.org/media/rekall-memory-forensics-cheatsheet.pdf)
– https://eforensicsmag.com/finding-advanced-malware-using-volatility/– Finding Advanced Malware Using Volatility. (Duc, H. N. (2016). Finding Advanced Malware Using Volatility. Retrieved December 26, 2016, from https://eforensicsmag.com/finding-advanced-malware-using-volatility/)
– http://securityxploded.com/malware-memory-forensics.php– Malware Memory Forensics. (Talekar, N. (n.d.). Malware Memory Forensics | www.SecurityXploded.com. Retrieved December 26, 2016, from http://securityxploded.com/malware-memory-forensics.php)
– https://www.alienvault.com/blogs/security-essentials/building-a-home-lab-to-become-a-malware-hunter-a-beginners-guide?utm_medium=Advertising&utm_source=THN&utm_content=social– Building a Home Lab to Become a Malware Hunter – A Beginner’s Guide. (Building a Home Lab to Become a Malware Hunter – A Beginner’s Guide. (n.d.). Retrieved December 26, 2016, from https://www.alienvault.com/)