官术网_书友最值得收藏!

How to do it…

This time, we don't need to know what kind of operating system we are dealing with - 32 or 64-bit. As we have already been said, DumpIt is a fusion of Win32dd and Win64dd in one executable. So, there are just two steps:

  1. Plug in the external drive in the target system
  2. Start DumpIt.exe and type y to start the acquisition process
Figure 2.3. Memory acquisition with DumpIt

As a result of the acquisition, you'll get two files: a file with the DMP extension and a file with the JSON extension. The first is the target system's memory dump with the computer name, date and time (UTC) in the file name, the second - the dump information, includes important information from a forensic point of view. It includes file size, system architecture type (32/64), KdCopyDataBlock KdDebuggerData, kdpDataBlockEncoded, sha256 hash, and so on. So that's it, the DMP file is ready to be analysed with the memory forensics software of your choice.

主站蜘蛛池模板: 崇明县| 黑水县| 洛浦县| 仁怀市| 玛多县| 武乡县| 延寿县| 文成县| 五大连池市| 大关县| 桂平市| 郯城县| 平乡县| 綦江县| 台前县| 永嘉县| 盐山县| 台东市| 仁寿县| 丹阳市| 盘锦市| 通渭县| 镇康县| 容城县| 灵璧县| 勐海县| 镇宁| 丰城市| 青海省| 昌图县| 莲花县| 兴义市| 静乐县| 广德县| 昌邑市| 咸阳市| 清原| 黄平县| 手游| 西平县| 伽师县|