this is for holding javascript data
Igor.Korkin edited 3.3. How to use MASHKA in memory forensics tasks.tex
over 9 years ago
Commit id: 09cd6f8c89d4d72d7e1788117d7ba68312999ee9
deletions | additions
diff --git a/3.3. How to use MASHKA in memory forensics tasks.tex b/3.3. How to use MASHKA in memory forensics tasks.tex
index 34f0839..5805df5 100644
--- a/3.3. How to use MASHKA in memory forensics tasks.tex
+++ b/3.3. How to use MASHKA in memory forensics tasks.tex
...
\subsection{3.3. How \subsection{How to use MASHKA in memory forensics tasks}
Memory analysis basic operations include text or binary signatures lookups through a memory dump. Current version of MASHKA can do multi-threaded lookup for the following objects: one byte (char) or wide-character (wchar_t) strings and byte fragments, for example addresses values.