Home Artists Posts Import Register
Patreon importer is back online! Tell your friends ✅

Downloads

Content

Further Research

Lab 6

When launched the debugger will use the CREATE_PROCESS_DEBUG_EVENT to set a breakpoint on the entry point of the target. The EXCEPTION_BREAKPOINT events will then be captured to display when the breakpoint is hit. 

Note that the EXCEPTION_BREAKPOINT handler also captures the “system breakpoint”.

Lab 6 - Exercise A

Use what you have learned in the previous labs to set a breakpoint on the NTDLL NtWriteFile function instead of the entry point. When the breakpoint is triggered read the arguments from the stack and print the buffer to the console.

  • Use the code from Lab 4 to set a breakpoint on NtWriteFile in the LOAD_DLL_DEBUG event handler
  • When the breakpoint is triggered retrieve the CONTEXT for the thread and get the stack pointer in ESP
  • Use the NtWriteFile function prototype documented on MSDN to calculate the offset to the Buffer and Length arguments. *Remember to account for the caller return address on the stack above ESP
  • Use the code from Lab 5 to read the Buffer and print it to the console

Lab 6 - Exercise B 

Try your new debugger with the target_antidebug.exe file. What are the results?




Files

Debugging Fundamentals Module 6

This is "Debugging Fundamentals Module 6" by OALABS on Vimeo, the home for high quality videos and the people who love them.

Comments

No comments found for this post.