What will you do when you conduct a malware analysis on a smartphone? You will focus on running processes or services, and also you'll capture memory dump and network packets for further analysis.

Of course you will keep an eye on the system logs. You want to real time monitor the logs but you will feel exhausted easily on doing this all day. If you want to real time monitor and export to files for further analysis, you could use adb logcat and pipe to a file on the workstation. The command is as below:

adb logcat | tee -a sys.log

Examine the log file and you could see someone logged into the smartphone at 14:07:20 through SSH, and the source ip was 172.20.10.3 .

最新文章

  1. 【NoSql】MongoDb
  2. EF架构~在global.asax里写了一个异常跳转,不错!
  3. webdriver的工作原理
  4. Hark的数据结构与算法练习之Bogo排序
  5. PHP 类的静态变量索引
  6. [原]Unity3D深入浅出 - 脚本开发基础(Scripts)
  7. HUNNU--湖师大--11409--Skill
  8. Program terminated with signal SIGKILL,Killed
  9. 「洛谷3338」「ZJOI2014」力【FFT】
  10. 2018-2019-3 网络对抗技术 20165305 Exp3 免杀原理与实践
  11. Git学习笔记——分支
  12. ubuntu16.04安装Navicate
  13. 小程序入口构造工具&二维码测试工具
  14. PID控制器开发笔记之九:基于前馈补偿的PID控制器的实现
  15. VsCode基本使用
  16. Redis知识点总结
  17. 关于DLNA
  18. e793. 监听JSpinner数据变化
  19. Metasploit应用举例
  20. A* 寻路的八个变种

热门文章

  1. OrCAD搭建Access数据库
  2. 【LeetCode OJ】Path Sum
  3. Swift基础语法 、 元组(Tuple)
  4. C++嵌入Python,以及两者混用
  5. ANSI C中关于FILE流的一些
  6. Java基础之-ExecutorService
  7. Mysql-简单安装
  8. 038. asp.netWeb用户控件之六实现日期选择的用户控件
  9. Sqlserver推荐参数配置及日志收缩问题
  10. .NET微信通过授权获取用户的基本信息