Home Artists Posts Import Register

Downloads

Content

Further Research

Lab 4 

When launched the debugger will print out the LOAD_DLL_DEBUG event for each loaded DLL along with some additional information about the DLL. Note that we are using the pefile Python module to parse the DLL PE info.

Lab 4 - Exercise

Update the handle_event_load_dll code to check if the loaded DLL is “ntdll.dll”. When “ntdll.dll” is loaded print the virtual address for the export “NtWriteFile”. 

Hint* the DLL export names are byte strings b“NtWriteFile” and the DLL name is a regular string.



Files

Debugging Fundamentals Module 4

This is "Debugging Fundamentals Module 4" by OALABS on Vimeo, the home for high quality videos and the people who love them.

Comments

No comments found for this post.