-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Practical Memory Forensics
By :

How often do you use communication apps to chat, send videos, or look at pictures of cute cats that have been sent to you? The answer is probably every day. Email and messengers have become an essential part of our lives, so we cannot avoid them. While examining the dump that's been taken from the victim's computer, we might come across a malicious document sent by email, and in the memory dump of the suspect's computer, we might find correspondence with accomplices.
We have already talked about email, so we'll start there.
Nowadays, there are many different email agents, and some people prefer to use a browser to check their mail. Thus, we can reduce the analysis to the following:
handles
plugin and look for files that might be in the attachment.Change the font size
Change margin width
Change background colour