- pdgmail GBHackers - Pdgmail Forensic tool to analysis process memory dump

Pdgmail Forensic tool to analysis process memory dump for Gmail . It will discover what it can out of the memory image including contacts, emails, last access times, IP addresses, basic headers etc.

Analysis with Pdgmail

In this article, we are to extract the process dump and then to unpack and analyze the dump.

To get the help menu pdgmail -h, here we are using Firefox so we need to find the process ID of it using the command ps -ef | grep fire.

Pdgmail Forensic tool to analysis process memory dump  - gmail 1 - Pdgmail Forensic tool to analysis process memory dump

Also Read Tracking Photo’s Geolocation with GPS EXIF DATA – Forensic analysis

Now we have the process ID 1446, then you need to dump the process gcore -o fire.dmp 1446

Pdgmail Forensic tool to analysis process memory dump  - gmail 2 - Pdgmail Forensic tool to analysis process memory dump

Now you can see a dump file created fire.dmp.1446. It’s time to analyze the dump file now.To dump run the command strings -el fire.dmp.1446.

Also Read Analyzing embedded files and executable code with Firmware Images – Binwalk

Pdgmail Forensic tool to analysis process memory dump  - gmail 4 - Pdgmail Forensic tool to analysis process memory dump

You can also get the number of unread emails in the Inbox.

Pdgmail Forensic tool to analysis process memory dump  - gmail 3 - Pdgmail Forensic tool to analysis process memory dump

Also the Body contents and the basic headers.

Pdgmail Forensic tool to analysis process memory dump  - gmail 5 - Pdgmail Forensic tool to analysis process memory dump

The contact list can be retrieved.

Pdgmail Forensic tool to analysis process memory dump  - gmail 6 - Pdgmail Forensic tool to analysis process memory dump

It will take around 20 minutes to complete the analysis and the output varies depends upon the number of the page that you have browsed with Firefox pdgmail Happy Investigating !!!

Also Read p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Penetration Testing Tool



Source link

No tags for this post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here