官术网_书友最值得收藏!

How it works...

The following list explains the plugins used in the recipe.

  1. Imageinfo: This plugin collects some basic information about the memory image you are analyzing: operating system, service pack, hardware architecture; and also useful information such as DTB address, KDBG address, and the timestamp of the image creation.
  1. Pslist: This plugin shows the processes of the system, including the offset, process name, process ID, parent process ID, number of threads, number of handles, date/time when the process started and exited, Session ID and if the process is a WoW64 process.
  2. Pstree: This plugin does the same as pslist, but shows the process list in tree form. It uses indentation and periods to indicate child processes.
  3. Dlllist: This plugin displays the DLLs loaded by the process of interest, or all processes if the -p or --pid switch isn't used.
  4. Malfind: This plugin allows the examiner to detect and extract hidden or injected code/DLLs in user mode memory for further antivirus scans and analysis.
主站蜘蛛池模板: 喜德县| 渑池县| 安塞县| 宁夏| 都匀市| 沅江市| 泰州市| 亳州市| 麻栗坡县| 前郭尔| 全州县| 乐亭县| 大洼县| 新巴尔虎左旗| 龙陵县| 延边| 定日县| 澄江县| 六盘水市| 台东市| 扎赉特旗| 闸北区| 厦门市| 深泽县| 霍邱县| 东乡| 平遥县| 钦州市| 赣州市| 襄汾县| 海晏县| 东安县| 玉环县| 股票| 大埔区| 诏安县| 门头沟区| 罗山县| 澳门| 海南省| 永宁县|