Identifying Malicious Callbacks
Identifying the behavior of malicious software will enable Cybersecurity practitioners to develop effective countermeasures and mitigation techniques. In this lab, you will use volatility to look at processes, parent processes, connections, unlinked DLLs, and malicious kernel callbacks that are associated with suspected malware.
Time
1 hour
Difficulty
Intermediate
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
Identifying the behavior of malicious software will enable Cybersecurity practitioners to develop effective countermeasures and mitigation techniques. In this lab, you will use volatility to look at processes, parent processes, connections, unlinked DLLs, and malicious kernel callbacks that are associated with suspected malware.
Learning Partner