Identifying Malicious Callbacks

Identifying the behavior of malicious software will enable Cybersecurity practitioners to develop effective countermeasures and mitigation techniques. In this lab, you will use volatility to look at processes, parent processes, connections, unlinked DLLs, and malicious kernel callbacks that are associated with suspected malware.

Time
1 hour
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Identifying the behavior of malicious software will enable Cybersecurity practitioners to develop effective countermeasures and mitigation techniques. In this lab, you will use volatility to look at processes, parent processes, connections, unlinked DLLs, and malicious kernel callbacks that are associated with suspected malware.