Coming mid-July
Cybrary Reimagined.
People first, Security first.
Coming mid-July.
Cybrary Reimagined.
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
People first, Security first.
Valid until October 31. Elevate your skills today!
Start for free

Identifying Malicious Callbacks

Identifying the behavior of malicious software will enable Cybersecurity practitioners to develop effective countermeasures and mitigation techniques. In this lab, you will use volatility to look at processes, parent processes, connections, unlinked DLLs, and malicious kernel callbacks that are associated with suspected malware.

Overview

Identifying the behavior of malicious software will enable Cybersecurity practitioners to develop effective countermeasures and mitigation techniques. In this lab, you will use volatility to look at processes, parent processes, connections, unlinked DLLs, and malicious kernel callbacks that are associated with suspected malware.

Learning Partner
CYBRScore
CYBRScore
Cybersecurity Technical Hands-on Labs