hell

Overview

During an incident response process, a memory dump of a compromised machine was acquired. Identify the domain contacted by the malicious code.

Required Resources

  • Volatility

  • Volatility plugins

  • Download the practice here