Challenge: Memory Mysteries
Course Content
Blue Team Analyst POV: Memory Analysis
In this months challenge, participants will be in the seat of a security analyst, conducting forensic analysis on a memory image. This type of evidence is crucial for forensic invesitgation, due to the nature of the volatile evidence. Certain findings such as, but not limited to, network connections, injected processes, command history and malicious DLLs can be found within the systems memory.
Successfully analyzing the memory image, participants will be able to demonstrate their proficiency in basic memory analysis. This skillset is essential in the field of cybersecurity, where analysts must constantly stay one step ahead of attackers to safeguard their organization's digital assets.
Who is this for?
Early career to mid practitioners. This challenge may be difficult for individuals new to cybersecurity, but the difficulty rating on this challenge is relatively low. We encourage using any internet resources and community/colleague assistance in completing the challenge.
Are write ups permitted?
Yes, write-ups are permitted; please do not post answers directly. All write-ups should include a link to Cybrary and the Cybrary Course.
What resources are available to help solve this challenge?
Online search, community, colleagues, or fellow practitioners.