We’ve talked about being a phishing victim before and how to protect ourselves, yet as everything evolves and mutate, new techniques are always implemented, and used to increase the probability of successful phishing attempts and evade detection.
Memory forensics/analysis is an interesting playground in the security and digital forensics investigation area, it consists of acquiring and analyzing the image of a volatile running computer memory. With the right tools and techniques, various interesting forensics artifacts can be extracted and examined leading to better understand the content of the captured memory image. In this article we are going to scratch the tip of the iceberg in this topic by introducing two simple yet powerful tools (DumpIt and Volatility) that can help you start playing around in this area.
In a recent Kentico project I was asked for some custom filtering options to the CMSDesk listing page of specific document types, allowing users to filter the documents based on specific fields of the document types.