workstation
How To Step Into a SYSCALL With a Debugger (via Kernel Binary Patch) | Reverse Engineering Win10 x64
In this screencast I show how you can step into a SYSCALL instruction from the user-mode debugger on Windows.
For details refer to my accompanying blog post:
References Used In This Video:
——————————————
– Virtual machine (VM) used: VMWare Workstation
– How to set up a VM for a debugging environment:
– How to set up WinDbg Next for fast kernel mode debugging in a VM:
#reverseengineering #x64 #windows #lowlevel
[ad_2]
source