No video

Debugging Windows Internals with x64dbg!

  Рет қаралды 2,399

Off By One Security

Off By One Security

Күн бұрын

Пікірлер: 11
@engiocsagRehtaf
@engiocsagRehtaf 5 ай бұрын
Thank you very much Sir!!!!
@ShxwnGrxhxm
@ShxwnGrxhxm 5 ай бұрын
Man... can't believe I got caught up at work and missed it!
@CHRISTIVN.OFFICIAL
@CHRISTIVN.OFFICIAL 5 ай бұрын
can't believe I missed the stream.
@mcacyber
@mcacyber 5 ай бұрын
thanks a lot
@falanavictor1986
@falanavictor1986 5 ай бұрын
I love you Stephen. You are my daily motivation
@faanross
@faanross 5 ай бұрын
epic stream!
@eduardschreder1623
@eduardschreder1623 4 ай бұрын
Duncan, for the "trace coverage", what is the difference between bit/byte/word?
@lPlanetarizado
@lPlanetarizado 5 ай бұрын
maybe unrelated to x64dbg, but in windows "context" structures have all the same information (like registers and stuff)? because alot of structures have a "context" field and i never know what the data means
@OffByOneSecurity
@OffByOneSecurity 5 ай бұрын
I did a stream on recreating undocumented structs on Windows using IDA Pro. One of the reasons I bring this up is that during that stream, I had to deal with the context structure for a given thread during an exception handler. The thread caused an access violation to a Guard Page, and the handler needed some of the register values at the moment in time when the exception was triggered.. So, think of the context as a snapshot of the state of the processor registers at a given moment in time. Same thing when you context switch out of a process and to another one (e.g. Notepad to Calc). In order to continue where you left off, the state of all registers and such are stored in something called the Process Control Block (PCB).
@lPlanetarizado
@lPlanetarizado 5 ай бұрын
@@OffByOneSecurity i see, thanks alot
@OffByOneSecurity
@OffByOneSecurity 5 ай бұрын
You actually inspired me to create a short video, as this question has been asked quite a few times. Hope it helps... kzbin.info/www/bejne/mqubdIaXhreZsKc
Creative Windows Evasion and Forensics with Yarden Shafir
1:14:19
Off By One Security
Рет қаралды 2,4 М.
Reverse Engineering with Binary Ninja (Binja)
1:15:06
Off By One Security
Рет қаралды 3,5 М.
女孩妒忌小丑女? #小丑#shorts
00:34
好人小丑
Рет қаралды 56 МЛН
Smart Sigma Kid #funny #sigma #comedy
00:40
CRAZY GREAPA
Рет қаралды 39 МЛН
Stay on your way 🛤️✨
00:34
A4
Рет қаралды 33 МЛН
UNO!
00:18
БРУНО
Рет қаралды 4,9 МЛН
Linus Torvalds: Speaks on Hype and the Future of AI
9:02
SavvyNik
Рет қаралды 169 М.
Analyzing and Unpacking Qakbot using Binary Ninja Automation
2:53:22
Process Injection Techniques: Deep Dive into Process Hollowing & Shellcode
1:32:48
Andrew Kelley   Practical Data Oriented Design (DoD)
46:40
ChimiChanga
Рет қаралды 82 М.
Security Research and Security Assessments of ICS Devices & Communications
1:33:33
Kernel 6.10 | Locked & Optimized
56:02
Maple Circuit
Рет қаралды 53 М.
Intro to Syscalls for Windows Malware
1:09:00
Prelude
Рет қаралды 14 М.
x64dbg Demo | CrackMe Challenges
46:33
stryker2k2
Рет қаралды 33 М.
女孩妒忌小丑女? #小丑#shorts
00:34
好人小丑
Рет қаралды 56 МЛН