Categories: Forensics Tools

Pdgmail – Forensic Tool to Analysis Process Memory Dump

Pdgmail Forensic tool to analysis process memory dump for Gmail data. It will discover what it can out of the memory image including contacts, emails, last access times, IP addresses, basic headers etc.

  • Author: Jeff Bryner

Also, You can Learn, Computer Forensics & Cyber Crime Investigation : Using Open Source Tools.

Analysis with Pdgmail

In this article, we are to extract the process dump and then to unpack and analyze the dump.

To get the help menu pdgmail -h, here we are using Firefox so we need to find the process ID of it using the command ps -ef | grep fire.

Also Read Tracking Photo’s Geolocation with GPS EXIF DATA – Forensic analysis

Now we have the process ID 1446, then you need to dump the process gcore -o fire.dmp 1446

Now you can see a dump file created fire.dmp.1446. It’s time to analyze the dump file now.To dump run the command strings -el fire.dmp.1446.

Also Read Analyzing embedded files and executable code with Firmware Images – Binwalk

You can also get the number of unread emails in the Inbox.

Also the Body contents and the basic headers.

The contact list can be retrieved.

It will take around 20 minutes to complete the analysis and the output varies depends upon the number of the page that you have browsed with Firefox pdgmail Happy Investigating !!!

you can also learn The Complete Hacking Tools in Kali Linux Operating System

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox,…

8 hours ago

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has…

8 hours ago

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial…

8 hours ago

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection…

8 hours ago

App with Over 100,000 Downloads from Google Play Steals User Data and Blackmails

A financial management app named Finance Simplified has been revealed as a malicious tool for…

8 hours ago

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections

A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting trojan,…

8 hours ago