As a continuation of the “Introduction to Memory Forensics” series, we’re going to take a look at Redline – a free analysis tool from FireEye that allows us to analyze a potentially compromised Windows system. Redline can collect memory and disk-based artifacts, including all running processes and drivers from memory, file system metadata, registry data, event logs, network information, services, tasks, and web history. The software provides an easy-to-use GUI interface that can help us analyze the collected data to find evil on a given system.
We’ll start with an overview of Redline collectors, and then we’ll create a collector and save it to a USB flash drive. We’ll then run that collector on our target Windows 10 VM and bring the results back to the analysis VM where we’ll briefly look at each category of collected forensic data.
Introduction to Memory Forensics:
• Introduction to Memory Forensics
Redline:
https://www.fireeye.com/services/free...
Redline User Guide:
https://www.fireeye.com/content/dam/f...
#Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics #MemoryForensics #MalwareAnalysis #Malware
Watch video Introduction to Redline online without registration, duration hours minute second in high quality. This video was added by user 13Cubed 08 October 2017, don't forget to share it with your friends and acquaintances, it has been viewed on our site 39,56 once and liked it 53 people.