官术网_书友最值得收藏!

How it works...

The following list explains the plugins used in the recipe.

  1. Imageinfo: This plugin collects some basic information about the memory image you are analyzing: operating system, service pack, hardware architecture; and also useful information such as DTB address, KDBG address, and the timestamp of the image creation.
  1. Pslist: This plugin shows the processes of the system, including the offset, process name, process ID, parent process ID, number of threads, number of handles, date/time when the process started and exited, Session ID and if the process is a WoW64 process.
  2. Pstree: This plugin does the same as pslist, but shows the process list in tree form. It uses indentation and periods to indicate child processes.
  3. Dlllist: This plugin displays the DLLs loaded by the process of interest, or all processes if the -p or --pid switch isn't used.
  4. Malfind: This plugin allows the examiner to detect and extract hidden or injected code/DLLs in user mode memory for further antivirus scans and analysis.
主站蜘蛛池模板: 金山区| 阳谷县| 合水县| 互助| 密山市| 共和县| 五寨县| 德兴市| 芷江| 江油市| 和龙市| 泗阳县| 顺平县| 波密县| 荆门市| 万荣县| 田林县| 漳州市| 长子县| 华坪县| 山东省| 浮山县| 汨罗市| 伊金霍洛旗| 南木林县| 花莲县| 临武县| 抚顺市| 锦屏县| 通州区| 含山县| 渝中区| 措美县| 西乌珠穆沁旗| 阳江市| 当雄县| 康乐县| 麟游县| 遵义市| 日土县| 尚志市|