SLIDE 1
2
Overview
Intro Background Info
- Malware
- Forensics and Incident Response
- Anti-Forensics
- Executables
Stealth Techniques
- Live System Anti-Forensics
Process Camouflage Process Injection Executing Code from Memory
- Offline Anti-Forensics
File Hiding Trojanizing Anti-Reverse Engineering
There will be something for the “Good Guys” near the end
- A brand new malware scanning tool