hell¶
Overview¶
During an incident response process, a memory dump of a compromised machine was acquired. Identify the domain contacted by the malicious code.
Required Resources¶
Volatility
Volatility plugins
Download the practice here
During an incident response process, a memory dump of a compromised machine was acquired. Identify the domain contacted by the malicious code.
Volatility
Volatility plugins
Download the practice here