← All talks

Forensic Analysis: Remote Code Execution & Memory Read Exploits #shorts

BSides Frankfurt0:2163 viewsPublished 2026-02Watch on YouTube ↗
About this talk
Understanding the forensic analysis of Remote Code Execution and Memory Read vulnerabilities. Discover the attacker's initial steps post-exploit. #Cybersecurity #VulnerabilityAnalysis #Forensics #REcurité #Memory
Show transcript [en]

Now um as we have instance for both uh vulnerabilities or both categories of vulnerabilities we're going to group it up a little bit. So on left side we've got the remote code execution. So how do we analyze it from a forensic point of view and on the right side we've got a memory read. So basically first steps for attacker as soon as he exploits the vulnerability what are his first steps.