Certain attacks that leave no trace on computer hard drives may be discoverable using a new tool that will be demonstrated at the Black Hat conference in Las Vegas next week.
Researchers who work for Mandiant will present a means for piecing together what malicious activity might have been carried out by an attacker's payload that runs only in memory and so evades traditional disk forensics, the researchers say.

In particular, the memory forensics tool being presented by Mandiant's Peter Silberman and Steve Davis finds traces in memory of what activity might have been performed via Meterpreter, a software module for the open-source Metasploit penetration testing framework.

The link for this article located at Network World is no longer available.