The document outlines a talk on using memory forensics with the Volatility framework to detect and analyze rootkits on macOS systems. It emphasizes the importance of memory forensics in capturing volatile data that is often not written to disk, discusses various analysis plugins and capabilities for macOS versions, and provides examples of how to extract information from memory dumps. The session aims to raise awareness of the ways advanced malware operates in memory and how to efficiently discover these threats.
Related topics: