官术网_书友最值得收藏!

  • Windows Forensics Cookbook
  • Oleg Skulkin Scar de Courcier
  • 164字
  • 2021-07-02 20:57:40

How to do it…

This time, we don't need to know what kind of operating system we are dealing with - 32 or 64-bit. As we have already been said, DumpIt is a fusion of Win32dd and Win64dd in one executable. So, there are just two steps:

  1. Plug in the external drive in the target system
  2. Start DumpIt.exe and type y to start the acquisition process
Figure 2.3. Memory acquisition with DumpIt

As a result of the acquisition, you'll get two files: a file with the DMP extension and a file with the JSON extension. The first is the target system's memory dump with the computer name, date and time (UTC) in the file name, the second - the dump information, includes important information from a forensic point of view. It includes file size, system architecture type (32/64), KdCopyDataBlock KdDebuggerData, kdpDataBlockEncoded, sha256 hash, and so on. So that's it, the DMP file is ready to be analysed with the memory forensics software of your choice.

主站蜘蛛池模板: 花垣县| 汝阳县| 衡东县| 柘城县| 渭源县| 广南县| 库尔勒市| 塔河县| 陈巴尔虎旗| 虹口区| 通江县| 咸丰县| 蓬安县| 香港| 留坝县| 井陉县| 托克托县| 沂源县| 苍南县| 镇坪县| 浦城县| 平谷区| 定西市| 茶陵县| 平度市| 静宁县| 左云县| 彭山县| 奈曼旗| 轮台县| 济南市| 营山县| 永修县| 灵武市| 吉首市| 中牟县| 深泽县| 新化县| 揭西县| 徐水县| 涞水县|