Use the Mandiant Redline memory analysis tool for threat assessments

Use the Mandiant Redline memory analysis tool for threat assessments

Use the Mandiant Redline memory analysis tool for threat assessments

Date: Mar 26, 2013

There will always be times when a user clicks on a malicious email attachment and infects his or her system. The question for security pros is what to do when that user reports the incident. Of course, you have to quarantine the malware to stop it from spreading to other users, but you also want to collect information to better understand how the system was compromised. With the Mandiant Redline memory analysis tool, security pros can quickly conduct thorough threat assessments and clarify the severity of such attacks.

In this SearchSecurity.com screencast, Keith Barker, CISSP and trainer for CBT Nuggets, walks through the three simple steps involved with using the Redline tool. First, he shows how to create a collector so Redline knows what information needs to be gathered. Once the collector is created, Keith loads Redline and analyzes the infected system. Finally, he shows how Redline can conveniently rank the discovered threats using Mandiant's Malware Risk Index. And because Redline can be used for memory analysis, hard-to-detect malware such as rootkits can be located with less effort. With the free Redline tool, security pros are no longer left guessing how a system was infected or which threat poses the greatest risk to user security.

About CBT NuggetsCBTNuggets
CBT Nuggets is a computer-based technology company specializing in cutting edge online IT training. Founded in 1999 by current CEO Dan Charbonneau, CBT Nuggets provides quick, easy and affordable learning by renowned instructors for individuals, small teams and large organizations. CBT Nuggets also offers a wealth of free videos on a variety of IT topics on the CBT Nuggets YouTube video channel.

About Keith Barker
Keith Barker, CISSP, a trainer for CBT Nuggets, has more than 27 years of IT experience. He is a double CCIE and has been named a Cisco Designated VIP. Keith is also the author of numerous Cisco Press books and articles.

More on Vulnerability Risk Assessment

  • canderson

    How involved should execs be in software security programs?

    VIDEO - Video: Chris Wysopal of Veracode discusses how the role of security executives is evolving in application security and vendor management.
  • canderson

    The gaping hole in your vulnerability management program

    VIDEO - Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan.
  • canderson

    How to make penetration test results matter

    VIDEO - Voodoo Security founder Dave Shackleford details how enterprises can make penetration test results more meaningful than a compliance exercise.
  • Cybersecurity risks masked by controversial vulnerability counts

    News - Experts have split opinions regarding the correct methodology for counting vulnerabilities, but all agree that focusing on numbers can mask real cybersecurity risks.

    ( Apr 13, 2015 )

  • How to conduct proper AWS vulnerability scanning

    Tip - Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model.
  • attack surface analysis

    Definition - An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering. Attack surface analysis allows the organization to detect those vulnerabilities.
  • Is the RSA 2015 'booth babe' ban a win for women in security?

    News - News roundup: The ban of "booth babes" at RSA Conference 2015 has been met with praise; does it equal an increase of women in infosec? Plus: Cyberthreat data-sharing bill advances; Flash flaw exploited days after patching; new twist on Google Play app vetting.

    ( Mar 27, 2015 )

  • Embedded systems security a growing concern amid rise of IoT

    News - As more devices become Internet-enabled, experts fear an embedded systems security worst-case scenario for enterprises, many of which are unaware of the risks or unable to mitigate them.

    ( Mar 23, 2015 )

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: