The following slides were take from a presentation I made at the Jamaica Computer Society's 2017 Conference, on October 19, 2017.
Malware Can Run, But Can't Hide... in a Memory Image
This talks is intended to show how memory forensics can be used during incident response to detect the presence of running zero-day malware.
Direct Link: https://speakerdeck.com/norvalwest/malware-can-run-but-cant-hide-dot-dot-dot-in-memory
Monday, October 30, 2017
Wednesday, August 30, 2017
Network Scans using built-in Windows Commands
There are several tools currently available today, for performing active reconnaissance on a network. However most persons don't realize that Windows comes with the built-in tools to discover computers and open ports on a network.
Here are three (3) commands that may be useful in your next security assessment.
Here are three (3) commands that may be useful in your next security assessment.
Saturday, August 19, 2017
Creating a Windows Service, in .NET
There are times you need a reliable way of running a process repeatedly, at predefined intervals.
All it takes is an 8 step process, using MS Visual Studio:
For more details on how to create a new service, see the reference link below.
Reference:
https://docs.microsoft.com/en-us/dotnet/framework/windows-services/walkthrough-creating-a-windows-service-application-in-the-component-designer
All it takes is an 8 step process, using MS Visual Studio:
- Create a new service project, in MS Visual Studio
- Add the OnStart and OnStop procedures
- Modify the project to display changes in the service status
- Add Installers to the project
- Set the Startup parameters
- Build the new service
- Test the new service, by installing and starting it on the local machine
- Uninstall the service from the local machine
For more details on how to create a new service, see the reference link below.
Reference:
https://docs.microsoft.com/en-us/dotnet/framework/windows-services/walkthrough-creating-a-windows-service-application-in-the-component-designer
Subscribe to:
Posts (Atom)