Hal Pomeranz (Deer Run Associates)

Abstract

Linux memory forensics is a whole different animal. Simply acquiring Linux memory and building an appropriate Volatilty profile can be challenging. But the payoff is enormous. Quickly get to the important data, find attacker rootkits, and more. Bring your laptops and be ready to run a VMware virtual machine for a hands-on session to get you up and running with Linux memory analysis.