Package rekall :: Package plugins :: Package windows :: Module pfn_test
[frames] | no frames]

Source Code for Module rekall.plugins.windows.pfn_test

 1  # Rekall Memory Forensics 
 2  # 
 3  # Copyright 2013 Google Inc. All Rights Reserved. 
 4  # 
 5  # Authors: 
 6  # Michael Cohen <scudette@gmail.com> 
 7  # 
 8  # This program is free software; you can redistribute it and/or modify 
 9  # it under the terms of the GNU General Public License as published by 
10  # the Free Software Foundation; either version 2 of the License, or (at 
11  # your option) any later version. 
12  # 
13  # This program is distributed in the hope that it will be useful, but 
14  # WITHOUT ANY WARRANTY; without even the implied warranty of 
15  # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 
16  # General Public License for more details. 
17  # 
18  # You should have received a copy of the GNU General Public License 
19  # along with this program; if not, write to the Free Software 
20  # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 
21  # 
22   
23  """Tests for the pfn plugins.""" 
24  from rekall import testlib 
25   
26 -class TestVtoP(testlib.SimpleTestCase):
27 # Create a test case by running the vadmap plugin and selecting at least one 28 # virtual address from each type. 29 PARAMETERS = dict( 30 commandline="vtop %(pids)s --virtual_address %(vaddr)s", 31 vaddr="0x00010000 0x00036000" 32 )
33
34 -class TestPTE(testlib.SimpleTestCase):
35 PARAMETERS = dict( 36 commandline="pte %(pte)s", 37 pte="0x3286b8" 38 )
39 40
41 -class TestPFN(testlib.SimpleTestCase):
42 """Test the pfn module.""" 43 44 # This is the test data in json format. Keys are _EPROCESS and values is a 45 # list of private addresses. 46 PARAMETERS = dict( 47 commandline="pfn %(pfn)s", 48 pfn=0 49 )
50