Recent DiscussionsMost RecentMost LikesNo Replies YetNo Solutions YetSolutionsWinDbg: Ep.3 – Debugging Malware The briefing says: [...] bp kernel32!LoadLibraryA ".printf \"Loading Library: %ma\",poi(esp+0x4);.echo};g"bp kernel32!GetProcAddress ".printf \"\t Looking up function: %ma\",poi(esp+0x8);.echo;g"bp...WinDbg: Ep.5 – Kernel Internals Question 9:Looking at the system process and the !token command, what is the User field? What I did: [...] lkd> !process 0 0 **** NT ACTIVE PROCESS DUMP **** PROCESS ffffdf0609685200 SessionI...WinDbg: Ep.4 – Debugging a Windows Crash Hi Q7:Identify the invalid reference to a memory address that causes the crash. instead of instructions, what characters are shown at this location? It seems I have issues understanding the questi...
Tagshelp & support62defensive cyber36offensive cyber25application security24cloud security15cyber crisis simulations12feedback7cyber team simulations6other5workforce exercising2