Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
History
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c6/69/cc/c669cc1e-30b6-2ee8-57a2-1a356338f475/mza_5498275658329189582.jpg/600x600bb.jpg
Learn As I Learn - Technology, Product and Cybersecurity
Akanksha Pathak
60 episodes
1 day ago
No time to learn? Take out few minutes from your life and learn new things every day! Please subscribe to start learning for FREE now!
Show more...
Education
RSS
All content for Learn As I Learn - Technology, Product and Cybersecurity is the property of Akanksha Pathak and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
No time to learn? Take out few minutes from your life and learn new things every day! Please subscribe to start learning for FREE now!
Show more...
Education
https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded/4732411/4732411-1587053849816-c6c798440b069.jpg
Series 4: Ep 8: Memory Matters
Learn As I Learn - Technology, Product and Cybersecurity
13 minutes 56 seconds
1 month ago
Series 4: Ep 8: Memory Matters

Dig deep into system memory! Learn how to illustrate the memory layout of a basic program and use advanced PowerShell commands (WMI, security-focused queries) todebug, check process integrity, detect DLL injections, and identify suspicious processes on Windows Server 2022.

Commands:

  • Get-Process | Where-Object { $_.ProcessName -eq "notepad" }
  • Get-WmiObject -Class Win32_OperatingSystem | Select-Object TotalVisibleMemorySize, FreePhysicalMemory
  • Get-Process
  • Get-WmiObject -Class Win32_Process | Select Name, ProcessId, ExecutablePath. For new powershell version simply use: Get-Process | Select-Object Name, Id, Path
  • Get-WmiObject -Class Win32_Process | Select-Object Name, ProcessId, ParentProcessId
  • Get-WmiObject -Class Win32_Process -Filter "Name = 'notepad.exe'" | Select-Object ProcessId, Name, @{Name='Owner';Expression={$_.GetOwner().User}}
  • Get-Process -Name notepad | Select-Object -ExpandProperty Modules | Select ModuleName, FileName
  • Get-WmiObject Win32_Process | Where-Object { $_.ExecutablePath -and ($_.ExecutablePath -notlike "C:\Windows\*" -and $_.ExecutablePath -notlike "C:\Program Files\*") } | Select Name, ProcessId, ExecutablePath
  • Get-Process | Where-Object { $_.Modules.ModuleName -contains "ntdll.dll" }
  • Get-WmiObject Win32_Process | Select-Object Name, ProcessId, CommandLine
  • Get-Process | Sort-Object StartTime -Descending | Select-Object Name, Id, StartTime | Select-Object -First 10


Learn As I Learn - Technology, Product and Cybersecurity
No time to learn? Take out few minutes from your life and learn new things every day! Please subscribe to start learning for FREE now!