PwC安全技术小组
CtrlK
  • PwC安全技术小组须知
  • 技术
    • 技术 - Web安全测试技术点
    • 技术 - 安全开发知识库
    • 技术 - 红队攻击手段介绍
      • offensive-security-experiments
      • offensive-security
      • miscellaneous-reversing-forensics
        • Windows / OS Internals
        • Cloud
        • Neo4j
        • Dump Virtual Box Memory
        • AES Encryption Using Crypto++ .lib in Visual Studio C++
        • Reversing Password Checking Routine
  • 工具
    • 工具 - BloodHound基础使用
    • 工具 - CobaltStrike基础使用
由 GitBook 提供支持
在本页

这有帮助吗?

  1. 技术
  2. 技术 - 红队攻击手段介绍
  3. miscellaneous-reversing-forensics

Windows / OS Internals

Here are the articles in this section:Configuring Kernel Debugging Environment with kdnet and WinDBG PreviewCompiling a Simple Kernel Driver, DbgPrint, DbgViewLoading Windows Kernel Driver for DebuggingSubscribing to Process Creation, Thread Creation and Image Load Notifications from a Kernel DriverListing Open Handles and Finding Kernel Object AddressesSending Commands From Your Userland Program to Your Kernel Driver using IOCTLWindows Driver Model (WDM)Windows Kernel Drivers 101x64 Calling Convention: Stack FrameSystem Service Descriptor Table - SSDTInterrupt Descriptor Table - IDTToken Abuse for Privilege Escalation in KernelManipulating ActiveProcessLinks to Hide Processes in UserlandETW: Event Tracing for Windows 101Exploring Injected ThreadsA short exploration of injected threads with Get-InjectedThreads.ps1 and WinDBGParsing PE File Headers with C++Instrumenting Windows APIs with FridaExploring Process Environment BlockExploring a couple of interesting members of the PEB memory structure fieldsWriting a Custom Bootloader

上一页miscellaneous-reversing-forensics下一页Cloud

最后更新于4年前

这有帮助吗?