- Windows Forensics Cookbook
- Oleg Skulkin Scar de Courcier
- 164字
- 2021-07-02 20:57:40
How to do it…
This time, we don't need to know what kind of operating system we are dealing with - 32 or 64-bit. As we have already been said, DumpIt is a fusion of Win32dd and Win64dd in one executable. So, there are just two steps:
- Plug in the external drive in the target system
- Start DumpIt.exe and type y to start the acquisition process

As a result of the acquisition, you'll get two files: a file with the DMP extension and a file with the JSON extension. The first is the target system's memory dump with the computer name, date and time (UTC) in the file name, the second - the dump information, includes important information from a forensic point of view. It includes file size, system architecture type (32/64), KdCopyDataBlock KdDebuggerData, kdpDataBlockEncoded, sha256 hash, and so on. So that's it, the DMP file is ready to be analysed with the memory forensics software of your choice.
- MySQL數據庫管理實戰
- Spring Cloud Alibaba核心技術與實戰案例
- C# 從入門到項目實踐(超值版)
- Java從入門到精通(第5版)
- Wireshark Network Security
- Learn Programming in Python with Cody Jackson
- Python應用輕松入門
- 高級C/C++編譯技術(典藏版)
- Bootstrap Essentials
- CKA/CKAD應試教程:從Docker到Kubernetes完全攻略
- C#程序設計基礎:教程、實驗、習題
- 網站構建技術
- 51單片機C語言開發教程
- Mastering openFrameworks:Creative Coding Demystified
- Python算法詳解