I’m happy to announce the release of several plugins for Volatility 3 that allow you to dig deeper into the memory analysis. One of those plugins is PteMalfind
, which is essentially an improved version of malfind
. Another one is PteResolve
which, similarly to the WinDBG command !pte
, allows you to inspect Page Table Entry (PTE) information for e.g., a given virtual address. In this blog post we will have a closer look at these and more plugins, and the PteEnumerator
base class and what you can do with it. The memory dump used for this blog post is available here. Some of the injection tools used in this blog post can be gathered from here.
Continue reading “Release of PTE Analysis plugins for Volatility 3”
Continue reading