Binary Hacks - Dump process virtual memory
- get [pid] of process
- get the memory mappings
cat /proc/[PID]/maps
- identify the memory range of interest
- connect gdb to pid and dump memory:
# perhaps need sudo
gdb --pid [PID]
> dump memory <PATH-TO-DUMP-FILE> [START_ADDR] [END_ADDR]
Then you can exam the dump with tools like hexdump.
[+] click to leave a comment [+]
>> SEND COMMENT <<