官术网_书友最值得收藏!

How it works...

The following list explains the plugins used in the recipe.

  1. Imageinfo: This plugin collects some basic information about the memory image you are analyzing: operating system, service pack, hardware architecture; and also useful information such as DTB address, KDBG address, and the timestamp of the image creation.
  1. Pslist: This plugin shows the processes of the system, including the offset, process name, process ID, parent process ID, number of threads, number of handles, date/time when the process started and exited, Session ID and if the process is a WoW64 process.
  2. Pstree: This plugin does the same as pslist, but shows the process list in tree form. It uses indentation and periods to indicate child processes.
  3. Dlllist: This plugin displays the DLLs loaded by the process of interest, or all processes if the -p or --pid switch isn't used.
  4. Malfind: This plugin allows the examiner to detect and extract hidden or injected code/DLLs in user mode memory for further antivirus scans and analysis.
主站蜘蛛池模板: 庆云县| 海宁市| 巧家县| 荔波县| 盐源县| 渭南市| 梧州市| 马关县| 锦州市| 民和| 靖远县| 潞西市| 资兴市| 鸡西市| 山阳县| 夹江县| 福安市| 融水| 建始县| 禄丰县| 镇沅| 收藏| 三门县| 美姑县| 叙永县| 沙湾县| 瓦房店市| 枣阳市| 东乡族自治县| 鹿邑县| 潞西市| 桐梓县| 乐业县| 疏勒县| 类乌齐县| 杭锦旗| 喀喇| 汽车| 昌宁县| 峨山| 仁布县|