Jump to content
Kwelwild

Android Forensics: Pulling Android Memory Using Lime

Recommended Posts

Posted



Description: In this video Haxor Magee shows us how to dump Android Memory using Lime tool. Why we need to dump the memory suppose our phone is infected with the malware or want to analysis the memory, what is going on in the memory, what kind of services are running etc. That's why we are using a line tool for dumping memory and for analysis you need to use Framework called Volatility or there are lots of other tools available.

Lime : - Downloads - lime-forensics - LiME - Linux Memory Extractor - Google Project Hosting
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures from Android devices. It also minimizes its interaction between user and kernel space processes during acquisition, which allows it to produce memory captures that are more forensically sound than those of other tools designed for Linux memory acquisition.

Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Original Source:


Sursa: Android Forensics: Pulling Android Memory Using Lime

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...