/usr/lib/python2.7/dist-packages/rekall/plugins/darwin/pfn.py is in python-rekall-core 1.6.0+dfsg-2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 | # Rekall Memory Forensics
#
# Copyright 2015 Google Inc. All Rights Reserved.
#
# Authors:
# Michael Cohen <scudette@google.com>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or (at
# your option) any later version.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
#
from rekall.plugins.common import pfn
from rekall.plugins.darwin import common
class DarwinVadMap(pfn.VADMapMixin,
common.DarwinProcessFilter):
def _FillMetadata(self, vaddr, metadata):
address_space = self.session.GetParameter("default_address_space")
for type, _, addr in address_space.describe_vtop(vaddr):
if type == "pte" and addr:
metadata["type"] = "Valid"
return self.profile._MMPTE(
addr, vm=self.physical_address_space)
def GeneratePageMetatadata(self, task):
for map in proc.task.map.hdr.walk_list(
"links.next", include_current=False):
metadata = {}
# Find the vnode this mapping is attached to.
vnode = map.find_vnode_object()
if vnode.path:
metadata["filename"] = vnode.path
pte_plugin = self.session.plugins.pte()
offset = map.links.start
end = map.links.end
while offset < end:
if self.start <= offset <= self.end:
pte = self._GetPTE(offset)
metadata = pte_plugin.ResolvePTE(pte, offset)
yield offset, metadata
self.session.report_progress("Inspecting 0x%08X", offset)
offset += 0x1000
|