Any tool(s) for knowing the layout (segments) of running process in Windows? -
I am always keen about
- How does the process look in memory?
- What are the different segments in it?
- How will the program (on disk) & amp; Are the processes related (in memory)?
My previous question:
In my search, I finally got an answer. I found this great article that cleared most of my queries:
In the above article, the author shows how to obtain different sections of the process (LINUX) and; He compared this with its ELF file, I am quoting this section here:
Motivator to see the actual layout of the process segment? We can use the file / proc / maps to reveal it. PID of the process that we want to inspect Before proceeding, we have a small problem here. Our test program runs so fast that before we can dump related / proc entry. I use gdb to solve it
A console (or a terminal emulator such as xterm) do this:
$ gdb test ( Gdb) main breakpoint 1 0x8048376 at (gdb) r breakpoint 1, 0x08048376 in main ()
right here, open another console and find the program "PID" If you want a quick way out, type:
$ cat / proc / `pgrep test` / maps
You see an output like the one below (You can get different output):
[1] 0039d000-003b2000 r-xp 00000000 16:41 1080084 / lib /ld-2.3.3. Then [2] 003b2000-003b3000r - p 00014000 16:41 1080084 / lib / dollar -2.3.3.So [3] 003b3000-003b4000 rw-p 00015000 16:41 1080084 / lbb / double -2.3.3.so [ 4] 003b6000-004cb000 r-xp 00000000 16:41 1080085 / lib /tls/libc-2.3.3.so [5] 004cb000-004cd000r - p 00115000 16:41 1080085 / lobby / tls / lcc-2.3. 3.so [6] 004cd000-004cf000 rw-p 00117000 16:41 1080085 / lib /tls/libc-2.3.3.so [7] 004cf000-004d1000 rw-p 004cf000 00:00 0 [8] 08048000-08049000 R -xp 00000000 16:06 66,970 / tmp / test [9] 08049000-0804a000 rw-p 00000000 16:06 66,970 / tmp / test [10] b7fec000-b7fed000 rw-p b7fec000 00:00 0 [11] bffeb000-c0000000 rw -P bffeb000 00:00 0 [12] ffffe000-fffff000 --- P 00000000 00:00 0
No E: I add numbers to each row as reference < / P>
gdb back, type:.
(gdb) q
So, in total, we see 12 segment (which is also known as virtual memory area - VMA).
But I want to know about Windows Process & amp; PE file format.
- Any device (s) to get the layout (class) of the layout running in Windows?
- Any other good resources to learn more on this topic?
Edit:
There are any good articles in between the PE file sections
& amp; nbsp; Mapping reveals; VA sections
?
P>
Comments
Post a Comment