In this series of blog posts we’ve walked you through getting WinDBG installed, setup, and got you started by attaching to a process and setting breakpoints. Our next step is the actual debugging part
This is a multipart series walking you through using WinDBG - we’ve gotten you off the ground with our last blog post, and now we’ll focus on it’s core functionality so that you can start debugging pr
用windbg attach 该进程, Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. *** wait with pending attach Symbol search path is: SRV*D:\
使用PCHunter64的进程钩子扫描到某个进程被HOOK了,可以使用Windbg分析: ## 显示汇编指令 : u u 向下反汇编 ub 向上反汇编 uf 反汇编整个函数 a 写入汇编指令 搜索内存(search memory) s –[type] range pattern 其中type, b表示byte, w表示word, d 表示dword, a表示ASCII stri