Hacking Livestream #31: Windows Kernel Debugging Part IV
Artem "honorary_bot" Shishkin is a fan of Windows RE, debugging and low-level stuff. He's been using WinDbg for kernel debugging for several years now for fun, customizing BSODs, building Windows kernel source tree or boot dependencies graph. Sometimes he might also accidentally discover such things as SMEP bypass on Windows 8 or how to disable PatchGuard in runtime. Being a great fan of Intel and specifically VMX technology he maintains his own bicycle debugger based on a bare metal hypervisor.
Twitter handle: https://twitter.com/honorary_bot
Github: https://github.com/honorarybot/
Links:
https://www.intel.com/content/www/us/en/processors/core/4th-gen-core-family-desktop-vol-1-datasheet.html
https://www.intel.com/content/www/us/en/processors/core/4th-gen-core-family-desktop-vol-2-datasheet.html
http://www.uefi.org/
http://wiki.osdev.org/Detecting_Memory_(x86)
https://www.intel.com/content/www/us/en/chipsets/8-series-chipset-pch-datasheet.html
http://www.acpi.info/
https://rweverything.com/
https://www.intel.com/content/dam/www/public/us/en/documents/technical-specifications/ehci-specification-for-usb.pdf
Видео Hacking Livestream #31: Windows Kernel Debugging Part IV канала GynvaelEN
Twitter handle: https://twitter.com/honorary_bot
Github: https://github.com/honorarybot/
Links:
https://www.intel.com/content/www/us/en/processors/core/4th-gen-core-family-desktop-vol-1-datasheet.html
https://www.intel.com/content/www/us/en/processors/core/4th-gen-core-family-desktop-vol-2-datasheet.html
http://www.uefi.org/
http://wiki.osdev.org/Detecting_Memory_(x86)
https://www.intel.com/content/www/us/en/chipsets/8-series-chipset-pch-datasheet.html
http://www.acpi.info/
https://rweverything.com/
https://www.intel.com/content/dam/www/public/us/en/documents/technical-specifications/ehci-specification-for-usb.pdf
Видео Hacking Livestream #31: Windows Kernel Debugging Part IV канала GynvaelEN
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Hacking Livestream #70: Dumping a SNES cartridge](https://i.ytimg.com/vi/7WkoeoOsPaw/default.jpg)
![Hacking Livestream #22: CONFidence DS CTF 2017 (part 2)](https://i.ytimg.com/vi/W7s5CWaw6I4/default.jpg)
![Hacking Livestream #77: Sigreturn-oriented programming](https://i.ytimg.com/vi/L259SbpYtXM/default.jpg)
![Summer Gamedev Challenge 2017 Erratum](https://i.ytimg.com/vi/CB62TQ13fC4/default.jpg)
![Hacking Livestream #30: Windows Kernel Debugging Part III](https://i.ytimg.com/vi/7zTtVYjjquA/default.jpg)
![Hacking Livestream #39: VMs in anti-RE](https://i.ytimg.com/vi/ZUXP9ZbPv9s/default.jpg)
![Hacking Livestream #21: CONFidence DS CTF 2017](https://i.ytimg.com/vi/kZtHy9GqQ8o/default.jpg)
![Just chatting (crashing cam in OBS with a piece of paper)](https://i.ytimg.com/vi/pgOQlOVJxXA/default.jpg)
![Vlog #011: Operating Systems - books & resources](https://i.ytimg.com/vi/0n0qnrQ38X0/default.jpg)
![Mission 016 - solutions](https://i.ytimg.com/vi/KCvQg7K5dnI/default.jpg)
![Gynvael's Hacking Livestream #89: Solving Teaser Dragon CTF 2019 Part 2](https://i.ytimg.com/vi/iSimunEpHyU/default.jpg)
![Hacking Livestream #61: Nanomites](https://i.ytimg.com/vi/XEX_RNVHcgY/default.jpg)
![#96: picoCTF 2019 (part 6)](https://i.ytimg.com/vi/rK2y0wMS_9w/default.jpg)
![Hacking Livestream #36: CHIP-8 VM Part III](https://i.ytimg.com/vi/9xGgZUMNl2Y/default.jpg)
![#92: picoCTF 2019 (part 2)](https://i.ytimg.com/vi/gHlundcY9GA/default.jpg)
![Hacking Livestream #44: NsJail with Robert Swiecki](https://i.ytimg.com/vi/yzN8fFB2tHc/default.jpg)
![Vlog #010: Dumping interpreter's history](https://i.ytimg.com/vi/u9hQEfhiTj4/default.jpg)
![Learning Rust Challenge! #8](https://i.ytimg.com/vi/Azoro6YyQBU/default.jpg)
![Hacking Livestream #38: CHIP-8 Debugger - Part II](https://i.ytimg.com/vi/0sphPKO8QTs/default.jpg)
![Vlog #009: Java faster than x86 asm?](https://i.ytimg.com/vi/QlweT6Qt9-k/default.jpg)