Jump to content
begood

Search and Dump Passwords from Memory using Memory DD

Recommended Posts

Posted

It's a common misconception among application developers that program memory is "safe" and anything stored in clear text in memory cannot really be hacked. Unfortunately, nothing could be further away from the truth. In this video created by John Strand from PaulDotCom we see how simple it is to identify and dump passwords from computer memory. However, in most cases one would need administrative privileges to be able to dump memory. But once a hacker has that he could very easily crack other passwords used on the system simply with a memory dump. This video uses the Mantech Memory DD tool for the demo.

SANS has a nice listing of tools which can be used for memory dumping on windows here. Try them out! Happy Memory Hunting :)

download : Download Memoryze 1.2.1.1 - Perform advanced analysis of live memory while the computer is running - Softpedia

Search and Dump Passwords from Memory using Memory DD Tutorial

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...