Igor.Korkin edited 3.3. How to use MASHKA in memory forensics tasks.tex  over 9 years ago

Commit id: 09cd6f8c89d4d72d7e1788117d7ba68312999ee9

deletions | additions      

       

\subsection{3.3. How \subsection{How  to use MASHKA in memory forensics tasks} Memory analysis basic operations include text or binary signatures lookups through a memory dump. Current version of MASHKA can do multi-threaded lookup for the following objects: one byte (char) or wide-character (wchar_t) strings and byte fragments, for example addresses values.