After multiple compromises of its Amazon EC2 instances, a company's Security Officer is mandating that memory dumps of compromised instances be captured for further analysis. A Security Engineer just received an EC2 abuse notification report from AWS stating that an EC2 instance running the most recent Windows
Server 2019 Base AMI is compromised.
How should the Security Engineer collect a memory dump of the EC2 instance for forensic analysis?
sanc
Highly Voted 3 years, 8 months agoDerekKey
Highly Voted 3 years, 7 months agoaddy_prepare
Most Recent 1 year, 9 months agoITGURU51
2 years, 1 month agojishrajesh
2 years, 5 months agodcasabona
2 years, 10 months agoSarksa
2 years, 10 months agosapien45
2 years, 10 months agosalamshayk
3 years agoAyusef
3 years, 7 months agokely
3 years, 7 months agoviestner
3 years, 7 months agosunilrch
3 years, 7 months agoamatol15
3 years, 7 months agoexamtaker12
3 years, 7 months agostt
3 years, 7 months agofarziuser
3 years, 8 months agoMr_Zaw
3 years, 8 months ago