Rapid7 Vulnerability & Exploit Database

Windows Process Memory Dump

Back to Search

Windows Process Memory Dump

Created
07/09/2021

Description

This module creates a memory dump of a process (to disk) and downloads the file for offline analysis. Options for DUMP_TYPE affect the completeness of the dump: "full" retrieves the entire process address space (all allocated pages); "standard" excludes image files (e.g. DLLs and EXEs in the address space) as well as memory mapped files. As a result, this option can be significantly smaller in size.

Author(s)

  • smashery

Platform

Windows

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;