Save on pre-loved laptops
Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

Something went wrong. Please try your request again later.

Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory


{"desktop_buybox_group_1":[{"displayPrice":"$43.99","priceAmount":43.99,"currencySymbol":"$","integerValue":"43","decimalSeparator":".","fractionalValue":"99","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"hVremP7rKBk96tATZ96KQ5uKBa1ugNMAioaDhinHV0z0sP0wX4A9MKSpoeyMpyzXIfG%2BKvYXhhT1XIVc0lk6hWsweuGsdUJO1U78o6OjNtdMi7fzPXdZdauQ4ooWIvKYs1J69hD1e%2Fvyfmdm9xcO3Q%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}]}

Purchase options and add-ons

A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniques

Key Features

  • Explore memory forensics, one of the vital branches of digital investigation
  • Learn the art of user activities reconstruction and malware detection using volatile memory
  • Get acquainted with a range of open-source tools and techniques for memory forensics

Book Description

Memory Forensics is a powerful analysis technique that can be used in different areas, from incident response to malware analysis. With memory forensics, you can not only gain key insights into the user's context but also look for unique traces of malware, in some cases, to piece together the puzzle of a sophisticated targeted attack.

Starting with an introduction to memory forensics, this book will gradually take you through more modern concepts of hunting and investigating advanced malware using free tools and memory analysis frameworks. This book takes a practical approach and uses memory images from real incidents to help you gain a better understanding of the subject and develop the skills required to investigate and respond to malware-related incidents and complex targeted attacks. You'll cover Windows, Linux, and macOS internals and explore techniques and tools to detect, investigate, and hunt threats using memory forensics. Equipped with this knowledge, you'll be able to create and analyze memory dumps on your own, examine user activity, detect traces of fileless and memory-based malware, and reconstruct the actions taken by threat actors.

By the end of this book, you'll be well-versed in memory forensics and have gained hands-on experience of using various tools associated with it.

What you will learn

  • Understand the fundamental concepts of memory organization
  • Discover how to perform a forensic investigation of random access memory
  • Create full memory dumps as well as dumps of individual processes in Windows, Linux, and macOS
  • Analyze hibernation files, swap files, and crash dumps
  • Apply various methods to analyze user activities
  • Use multiple approaches to search for traces of malicious activity
  • Reconstruct threat actor tactics and techniques using random access memory analysis

Who this book is for

This book is for incident responders, digital forensic specialists, cybersecurity analysts, system administrators, malware analysts, students, and curious security professionals new to this field and interested in learning memory forensics. A basic understanding of malware and its working is expected. Although not mandatory, knowledge of operating systems internals will be helpful. For those new to this field, the book covers all the necessary concepts.

Table of Contents

  1. Why Memory Forensics?
  2. Acquisition Process
  3. Windows Memory Acquisition
  4. Reconstructing User Activity with Windows Memory Forensics
  5. Malware Detection and Analysis with Windows Memory Forensics
  6. Alternative Sources of Volatile Memory
  7. Linux Memory Acquisition
  8. User Activity Reconstruction
  9. Malicious Activity Detection
  10. MacOS Memory Acquisition
  11. Malware Detection and Analysis with macOS Memory Forensics

Editorial Reviews

About the Author

Svetlana Ostrovskaya is a Principal DFIR Consultant at Group-IB, one of the global leaders in preventing and investigating high-tech crimes and online fraud. Besides active involvement in incident response engagements, Svetlana has extensive training experience in various regions, including Russia, CIS, MEA, Europe, APAC. She has co-authored articles on information security and computer forensics, as well as a number of training programs, including Windows Memory Forensics, Linux Forensics, Advanced Windows Forensic Investigations, and Windows Incident Response and Threat Hunting. Oleg Skulkin is the Head of Digital Forensics and Malware Analysis Laboratory at Group-IB. Oleg has worked in the fields of digital forensics, incident response, and cyber threat intelligence and research for over a decade, fueling his passion for uncovering new techniques used by hidden adversaries. Oleg has authored and co-authored multiple blog posts, papers, and books on related topics and holds GCFA and GCTI certifications.

Product details

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.1 out of 5 stars
9 global ratings

Top reviews from the United States

  • Reviewed in the United States on October 25, 2022
    Format: PaperbackVerified Purchase
    Please, buy The Art of Memory Forensics instead. This book is really just a copy of that - except, with way less information and some updated screenshots.
    The writing is bad, the content is bad... Yikes to this book. It overexplains basic concepts and under explains harder ones (you know, like people do when they don't actually know what they are talking about?)
    Overall: can't say anything good about it. If you're looking to learn something useful, there are far better books out there - even if they are almost a decade old. You'll get more out of the outdated books.
    2 people found this helpful
    Report

Top reviews from other countries

  • Leo
    5.0 out of 5 stars Good for beginners
    Reviewed in the United Arab Emirates on June 7, 2023
    Format: PaperbackVerified Purchase
    This book is a good way to start memory analysis. It covers basic concepts supported by practical examples, showcasing tools and things to pay attention to.
  • Bojangles
    5.0 out of 5 stars Does what it says on the tin
    Reviewed in the United Kingdom on April 16, 2022
    Format: PaperbackVerified Purchase
    Content is excellent, a minor point is that the text in screenshots is quite small in the print version, I wish I’d bought the digital version.
  • Cliente Amazon
    5.0 out of 5 stars This book can be considered the main important source of information about memory forensics
    Reviewed in Italy on November 17, 2022
    Format: PaperbackVerified Purchase
    I started to work within digital forensics and incident response a long time ago, and I always considered deeply important my own collection of resources and toolkit. After reading also "The Art of Memory Forensics", that is considered the bible about this topic, I can say that this book is a "must have" for all DFIR experts. It explains clearly what you really need for your investigation and can be used also as a cookbook when you need a quick reference. The book helps to develop and improve gradually your skills and gives useful examples step by step. I can warmly suggest buying it and keep it as main reference for every investigation.
  • mistero
    3.0 out of 5 stars per iniziare va bene
    Reviewed in Italy on May 19, 2023
    Format: PaperbackVerified Purchase
    Se siete alle prime armi con la memory forensics può andare bene, cioè copre tutti gli argomenti principali. Ma se cercate qualcosa che vada in profondità, cioè nei dettagli di come funziona la gestione della memoria da parte dei diversi kernel e il rapporto fra questa e i vari malware e le varie tecniche di compromissione allora questo libro non va bene.