Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory
Purchase options and add-ons
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniques
Key Features
- Explore memory forensics, one of the vital branches of digital investigation
- Learn the art of user activities reconstruction and malware detection using volatile memory
- Get acquainted with a range of open-source tools and techniques for memory forensics
Book Description
Memory Forensics is a powerful analysis technique that can be used in different areas, from incident response to malware analysis. With memory forensics, you can not only gain key insights into the user's context but also look for unique traces of malware, in some cases, to piece together the puzzle of a sophisticated targeted attack.
Starting with an introduction to memory forensics, this book will gradually take you through more modern concepts of hunting and investigating advanced malware using free tools and memory analysis frameworks. This book takes a practical approach and uses memory images from real incidents to help you gain a better understanding of the subject and develop the skills required to investigate and respond to malware-related incidents and complex targeted attacks. You'll cover Windows, Linux, and macOS internals and explore techniques and tools to detect, investigate, and hunt threats using memory forensics. Equipped with this knowledge, you'll be able to create and analyze memory dumps on your own, examine user activity, detect traces of fileless and memory-based malware, and reconstruct the actions taken by threat actors.
By the end of this book, you'll be well-versed in memory forensics and have gained hands-on experience of using various tools associated with it.
What you will learn
- Understand the fundamental concepts of memory organization
- Discover how to perform a forensic investigation of random access memory
- Create full memory dumps as well as dumps of individual processes in Windows, Linux, and macOS
- Analyze hibernation files, swap files, and crash dumps
- Apply various methods to analyze user activities
- Use multiple approaches to search for traces of malicious activity
- Reconstruct threat actor tactics and techniques using random access memory analysis
Who this book is for
This book is for incident responders, digital forensic specialists, cybersecurity analysts, system administrators, malware analysts, students, and curious security professionals new to this field and interested in learning memory forensics. A basic understanding of malware and its working is expected. Although not mandatory, knowledge of operating systems internals will be helpful. For those new to this field, the book covers all the necessary concepts.
Table of Contents
- Why Memory Forensics?
- Acquisition Process
- Windows Memory Acquisition
- Reconstructing User Activity with Windows Memory Forensics
- Malware Detection and Analysis with Windows Memory Forensics
- Alternative Sources of Volatile Memory
- Linux Memory Acquisition
- User Activity Reconstruction
- Malicious Activity Detection
- MacOS Memory Acquisition
- Malware Detection and Analysis with macOS Memory Forensics
- ISBN-101801070334
- ISBN-13978-1801070331
- PublisherPackt Publishing
- Publication dateMarch 17, 2022
- LanguageEnglish
- Dimensions7.5 x 0.69 x 9.25 inches
- Print length304 pages
Customers who bought this item also bought
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac MemoryPaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7Only 8 left in stock - order soon.
X-Ways Forensics Practitioner's GuidePaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skillsPaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7
Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd EditionPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Friday, Nov 7
Practical Linux Forensics: A Guide for Digital InvestigatorsPaperback$3.99 shippingGet it Nov 14 - 20
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source toolsPaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7
Customers also bought or read
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Paperback$39.23$39.23FREE delivery Friday - Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices
Paperback$46.84$46.84FREE delivery Friday - Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition
Paperback$28.83$28.83Delivery Friday - iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
Paperback$44.45$44.45FREE delivery Friday
Editorial Reviews
About the Author
Product details
- Publisher : Packt Publishing
- Publication date : March 17, 2022
- Language : English
- Print length : 304 pages
- ISBN-10 : 1801070334
- ISBN-13 : 978-1801070331
- Item Weight : 1.16 pounds
- Dimensions : 7.5 x 0.69 x 9.25 inches
- Best Sellers Rank: #667,301 in Books (See Top 100 in Books)
- #63 in Computer Viruses
- #191 in Privacy & Online Safety
- #454 in Internet & Telecommunications
- Customer Reviews:
About the authors

Oleg Skulkin is the Head of DFIR Team at Group-IB. Oleg has worked in the fields of digital forensics, incident response, and cyber threat intelligence and research for almost a decade, fueling his passion for uncovering new techniques used by hidden adversaries. Oleg has authored and co-authored multiple blog posts, papers, and books on related topics and holds GCFA and GCTI certifications. You can contact him on Twitter at oskulkin.

Svetlana Ostrovskaya is a Principal DFIR Consultant at Group-IB, one of the global leaders in preventing and investigating high-tech crimes and online fraud. Besides active involvement in incident response engagements, Svetlana has extensive training experience in various regions, including Russia, CIS, MEA, Europe, APAC. She has co-authored articles on information security and computer forensics, as well as a number of training programs, including Windows Memory Forensics, Linux Forensics, Advanced Windows Forensic Investigations, and Windows Incident Response and Threat Hunting.
Customer reviews
- 5 star4 star3 star2 star1 star5 star71%0%15%0%14%71%
- 5 star4 star3 star2 star1 star4 star71%0%15%0%14%0%
- 5 star4 star3 star2 star1 star3 star71%0%15%0%14%15%
- 5 star4 star3 star2 star1 star2 star71%0%15%0%14%0%
- 5 star4 star3 star2 star1 star1 star71%0%15%0%14%14%
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on October 25, 2022Format: PaperbackVerified PurchasePlease, buy The Art of Memory Forensics instead. This book is really just a copy of that - except, with way less information and some updated screenshots.
The writing is bad, the content is bad... Yikes to this book. It overexplains basic concepts and under explains harder ones (you know, like people do when they don't actually know what they are talking about?)
Overall: can't say anything good about it. If you're looking to learn something useful, there are far better books out there - even if they are almost a decade old. You'll get more out of the outdated books.
Top reviews from other countries
LeoReviewed in the United Arab Emirates on June 7, 20235.0 out of 5 stars Good for beginners
Format: PaperbackVerified PurchaseThis book is a good way to start memory analysis. It covers basic concepts supported by practical examples, showcasing tools and things to pay attention to.
BojanglesReviewed in the United Kingdom on April 16, 20225.0 out of 5 stars Does what it says on the tin
Format: PaperbackVerified PurchaseContent is excellent, a minor point is that the text in screenshots is quite small in the print version, I wish I’d bought the digital version.
Cliente AmazonReviewed in Italy on November 17, 20225.0 out of 5 stars This book can be considered the main important source of information about memory forensics
Format: PaperbackVerified PurchaseI started to work within digital forensics and incident response a long time ago, and I always considered deeply important my own collection of resources and toolkit. After reading also "The Art of Memory Forensics", that is considered the bible about this topic, I can say that this book is a "must have" for all DFIR experts. It explains clearly what you really need for your investigation and can be used also as a cookbook when you need a quick reference. The book helps to develop and improve gradually your skills and gives useful examples step by step. I can warmly suggest buying it and keep it as main reference for every investigation.
-
misteroReviewed in Italy on May 19, 20233.0 out of 5 stars per iniziare va bene
Format: PaperbackVerified PurchaseSe siete alle prime armi con la memory forensics può andare bene, cioè copre tutti gli argomenti principali. Ma se cercate qualcosa che vada in profondità, cioè nei dettagli di come funziona la gestione della memoria da parte dei diversi kernel e il rapporto fra questa e i vari malware e le varie tecniche di compromissione allora questo libro non va bene.





