Memory forensic tools provide a thorough way to detect malwares and ferret out cyber crimes. AMExtractor is one such tool that can dump out the physical content of your Android device even without kernel source code.
ROOT access required
Define target phone's configuration in config.h
. Preset configurations are available for Galaxy Nexus, Nexus 4, Nexus 5, and Samsung Galaxy S4 (I9500).
Configure options
memory_model
: one of FLAT_MEM, SPARSE_MEM, or DISCONTIG_MEM.sizeof(struct page)
: typical size is 32.trigger_method
: one of USE_SYNC_PTMX or USE_SEEK_ZERO.Compile and push the code to the device.
Test and Run
./AMExtractor -d
. On PC side, forward a TCP connection from the device to localhost and capture the output.> Visit AMExtractor Website <