Identifying Malicious Callbacks
Identifying the behavior of malicious software will enable Cybersecurity practitioners to develop effective countermeasures and mitigation techniques. In this lab, you will use volatility to look at processes, parent processes, connections, unlinked DLLs, and malicious kernel callbacks that are associated with suspected malware.

Overview
Identifying the behavior of malicious software will enable Cybersecurity practitioners to develop effective countermeasures and mitigation techniques. In this lab, you will use volatility to look at processes, parent processes, connections, unlinked DLLs, and malicious kernel callbacks that are associated with suspected malware.

Learning Partner

CYBRScore
Cybersecurity Technical Hands-on Labs