workstation

How To Step Into a SYSCALL With a Debugger (via Kernel Binary Patch) | Reverse Engineering Win10 x64



In this screencast I show how you can step into a SYSCALL instruction from the user-mode debugger on Windows.

For details refer to my accompanying blog post:

References Used In This Video:
——————————————
– Virtual machine (VM) used: VMWare Workstation

– How to set up a VM for a debugging environment:

– How to set up WinDbg Next for fast kernel mode debugging in a VM:

#reverseengineering #x64 #windows #lowlevel

[ad_2]

source

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button