{"componentChunkName":"component---src-templates-post-template-js","path":"/magical-windbg-vol2-00-en","result":{"data":{"markdownRemark":{"id":"c88d241f-6bf5-51f3-b8a1-88f561b8b9e8","html":"<blockquote>\n<p>This page has been machine-translated from the <a href=\"/magical-windbg-vol2-00\">original page</a>.</p>\n</blockquote>\n<blockquote>\n<p>All content in this book is based on information from official documentation and other websites, or from publicly available books and similar sources. For that reason, when I refer to technical topics, I cite sources in footnotes whenever possible. In addition, everything written in this book reflects my personal views and does not represent any company or organization I belong to.</p>\n</blockquote>\n<p>I am publishing the contents of <a href=\"https://techbookfest.org/product/6hBEkTPSxJC5vSRTqa81F9?productVariantID=etDmVeZ36duh9pmsXE0MKM\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Magical WinDbg 2 - Learn User-Mode &#x26; Kernel Debugging Through CTFs -</a>, which I distributed for free at Tech Book Fest 16.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 304px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/b99ebbdddbb1bd0431522290b9fd109b/c1724/u9UkVreCKBd2k5AW5J3ja4.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 142.08333333333331%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAcCAIAAADuuAg3AAAACXBIWXMAAAsTAAALEwEAmpwYAAAGjUlEQVQ4y2WQaVTTZxbG/9VxbG07ZyicWgdSLcoqLQioIAiKUJZIkC0RE4MS9q1MCAYhLAnENCtkIQSSEEJYsrAkIUBUYhwBjx0oqChFxAAGFJURZ+iwyJKJtX7omefDe+79vfe595wHqH04ZTKZNra2TP+vD2xzc3NlaflDY8bvPuZXjUD1A8N7WMPnZ2Vnd6hU3T097R0dUplMUCdUtLWKxPVSmTQ1LZUv4BumDPUN9Q/GHpjnjctPAN4Hs1qtbmhoYDKZZDJZLpdTKBSlUikUCjkcjkAgYDAYZt7Y2KhSqcwrzPNzy1O/m6dmZvr7+ycmJgYGBoaHhxcXF0dHR588eTI5OTk/P28wGAYHB83t2NjYyMiIGZstz1anfzfPGGfHx8efP38+Nzc3NTVlNrx48WJ2dvbp06dGo9FcmLcsLCy8J69f/+sP5o3NdxmsvNPy+vr66sqqudrYWH/7du3Nmze//rq0trb28tXC4uvFLbN+C+zZyjTwPu31zU3zOzQycrNv4OfBn/r7blzTantv9rUruzQa9dVrXdd7e1qlTdd1V5dW/rvxW0bz5sveisoUIpZemvWPnNzWNBQNV4oj3SKmSO7e6ZvTd9zRTjZWvxIxjJJiY1vlz/TyVhNvaEA1fvXhf+6/eQR8nBNniXcoOWprtAe0zrvSd4P8v/ZwsY46HpoSh4AnFZGoHKWwqF+SMFEI7v7GHTNXrlnNF99HyxrFbYDLJYRLeka2U8zSsY9McZ8tIEAPQnbpTu+orwjCyHHO2eidyHO2AfGdVey7TXfCk3ieGRylUv2oXmyoJgG70fDd4B8r3BFYWzDP5QuRmwX+kINPaKFLj6FgecqWN406K/EKgHr4xqah8WhaUw+XcQFRyB6X8mdkwJ5zcZ+HNUphsZRDngAoc6cd9iMv0bbkIaDyUebw4w3DSG+PYAd76K+eRQe8kAw26T4XmxaVK7qtoLwSAcfYMQ4n0kDwdu1Ze15MkGMIywqqdEUqWAma+XJF5wQT//YeWP4Tjy+hJ573KSZ6xJx1+BpcTBf1TnUBLnIosvlLMD4zMlfYchFCio2OiCj6MVgs+l5xJDZ/W35DlvyGuEU4O6F9Ki3/HHR8vy8UFnY5KbPQq5wE7MxP+oa4K+6mFf0XKFIWCMM42qGs/hJ8HDiICggnaLishvIfxGSiaV53uwp3wMbvC9cz3tG0yfq8jNYKYHux1rmhNYiEgcCO2rp5+lr7/QCK8dznf/RE+oqOLb6c5hEUwyChTS/1uCz0p1aeVtah39lEFSdePnWJCkSmxBMT/GCYcAvEgag8SG0J7cKRbNp5OLeAtKWrvsMqrG/mjQ4rTNM902pmqBdkp9XJEwf8nG2iAovSAZuMMu9YxLawzCDf0mvwjq8gtL85RksiEPfIJWvami09c6uPbfpFtjHdvakoq8PkwLDoMC4hILGQzYkDPksTIDPbIsIkpIOsb/fFW3ziZgPs2WuxO/VIkB6HW9PWbfWJ1gcbF7qZk1QcAkIoTooLRLEiETlCDBiwPHXJCvC2/yrE0hHy6T43TxB4z/5g4MtjjrYHm6HkXixtuKps9abYpK+WFVEc7Am+7vBEeFpyJCK6oghIgWNTbRLs7GItvaB/DkYBvvGWe5P3W/vZOX1LDye0I0WZfkikj1/z39OR9Mvc6mJl+5VSDLUsj3TmBg3Izzvz2MuGZRGfsuP04W2uIKcocEIy5Er6sfiC3FJi53l+a7yIezLB9SQUR6aa9MSNIZrpNvVlK6GlrwSILWA1hhyW+FtTXJyi4eHntbQCFju5pNxNxj6ZfkaNujJSWDss4nxM65Irm0wD7LVB0cY/hSY9+0VXCUDFahKlMmgNlqQkXLwvyCZVXiyqSmbR7L1DoN4+13IqjTUVmhY+IBzNE4pMavZSN//fquo1pWD6OhMoxWgOC1rDVNwYRQ6nEA9p41PHOfATBNDhwGpUpiaRMsOitMgaANnMQUXzY3a+PoPAhKXz0HnNvGIAQZb7d3Tk3dMQDDV0XS6sjoDPxR9yKnGPCNPjyGN03mIdAy7VAm3Tn6gekjsu6OPzeuLKunllQkUWQCzEEAuUWLmY1Fl06xaJ00xlR2E9Hcv2wkIl3KSh2lI0reJPnLvb1a+2i55Z18sJVcHShOx6+Lm7LDTgzqiNJHT7cBSBwprTTfxgKR/MpHtQaM4cvH8HKliZ6qogH1VxfHW8AB3zVGcFbCABpTuNbACz+qL/B8qntTwjTOgGAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/b99ebbdddbb1bd0431522290b9fd109b/8ac56/u9UkVreCKBd2k5AW5J3ja4.webp 240w,\n/static/b99ebbdddbb1bd0431522290b9fd109b/e6f1a/u9UkVreCKBd2k5AW5J3ja4.webp 304w\"\n              sizes=\"(max-width: 304px) 100vw, 304px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/b99ebbdddbb1bd0431522290b9fd109b/8ff5a/u9UkVreCKBd2k5AW5J3ja4.png 240w,\n/static/b99ebbdddbb1bd0431522290b9fd109b/c1724/u9UkVreCKBd2k5AW5J3ja4.png 304w\"\n            sizes=\"(max-width: 304px) 100vw, 304px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/b99ebbdddbb1bd0431522290b9fd109b/c1724/u9UkVreCKBd2k5AW5J3ja4.png\"\n            alt=\"cover image\"\n            title=\"cover image\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h2 id=\"table-of-contents\" style=\"position:relative;\"><a href=\"#table-of-contents\" aria-label=\"table of contents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Table of Contents</h2>\n<ul>\n<li><a href=\"/magical-windbg-vol2-00-en\">Preface</a></li>\n<li><a href=\"/magical-windbg-vol2-01-en\">Chapter 1: Environment Setup</a></li>\n<li><a href=\"/magical-windbg-vol2-02-en\">Chapter 2: Surface Analysis of DoPClient and DoPDriver</a></li>\n<li><a href=\"/magical-windbg-vol2-03-en\">Chapter 3: Static Analysis of DoPClient</a></li>\n<li><a href=\"/magical-windbg-vol2-04-en\">Chapter 4: Dynamic Analysis of DoPClient</a></li>\n<li><a href=\"/magical-windbg-vol2-05-en\">Chapter 5: Static Analysis of DoPDriver</a></li>\n<li><a href=\"/magical-windbg-vol2-06-en\">Chapter 6: Dynamic Analysis of DoPDriver</a></li>\n</ul>\n<h2 id=\"about-this-book\" style=\"position:relative;\"><a href=\"#about-this-book\" aria-label=\"about this book permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>About This Book</h2>\n<p>Thank you very much for picking up this book. My name is Kashiwaba (@kash1064).</p>\n<p>My main areas of interest are reverse engineering and digital forensics, and as a hobby I participate in security competitions called Capture The Flag (CTF).</p>\n<p>In this book, I use a CTF Reversing challenge as the theme to introduce Windows user-mode and kernel-mode debugging techniques with WinDbg.</p>\n<p>In a typical Reversing challenge in a CTF, the goal is to analyze a given executable using various tools and techniques and obtain the correct keyword (Flag).</p>\n<p>In a typical Reversing challenge, analysis proceeds roughly through the following steps.</p>\n<ol>\n<li>First, examine the target program at a high level using its file type, metadata, header information, and similar clues. (Surface analysis)</li>\n<li>Next, use a disassembler tool (or decompiler) to reconstruct the target program into assembly code or pseudo-C code and understand its implementation without actually running it. (Static analysis)</li>\n<li>Then, run the program and observe its behavior. You can also use a debugger such as WinDbg or gdb to pause execution and inspect or modify CPU registers and memory in order to understand how the program works. (Dynamic analysis)</li>\n<li>Finally, combine the results from each step to uncover the full picture of the program and identify information that the user would not normally know, such as a password, in order to obtain the correct keyword (Flag).</li>\n</ol>\n<p>This book follows those same steps to analyze the program and obtain the Flag, while introducing Windows user-mode and kernel-mode debugging techniques with WinDbg along the way.</p>\n<p>Like “Magical WinDbg - Enjoying Windows Dump Analysis and Troubleshooting by Feel -” <sup id=\"fnref-1\"><a href=\"#fn-1\" class=\"footnote-ref\">1</a></sup>, which I distributed at Tech Book Fest 15, this book is not intended to comprehensively cover introductory Windows debugging topics.</p>\n<p>Instead, it is structured as a hands-on guide for enjoying Windows debugging, while also pointing readers to useful sources for foundational topics.</p>\n<h2 id=\"why-i-wrote-this-book\" style=\"position:relative;\"><a href=\"#why-i-wrote-this-book\" aria-label=\"why i wrote this book permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why I Wrote This Book</h2>\n<p>In this book, I introduce debugger scripts available in the latest WinDbg and methods for analyzing kernel driver modules with a kernel debugger.</p>\n<p>There is currently plenty of information about debugging Windows executables, but I feel that there is still very little information available in Japanese about how to use WinDbg as a debugger or about Windows kernel debugging.</p>\n<p>In particular, the latest installable version of WinDbg provides powerful features such as JavaScript debugger scripts <sup id=\"fnref-2\"><a href=\"#fn-2\" class=\"footnote-ref\">2</a></sup>, but I feel that knowledge about these relatively new capabilities is still limited.</p>\n<p>Information about Windows kernel debugging is also scarce because the prerequisite knowledge required for analysis is more advanced, and as far as I know there are almost no books written in Japanese on the topic.</p>\n<p>Given that situation, I wrote this book in the hope of increasing the amount of Japanese-language information about WinDbg-based debugging techniques and Windows kernel debugging, even if only a little.</p>\n<p>This book does not comprehensively cover introductory Windows debugging knowledge with WinDbg, but I hope it will help people who are interested in WinDbg and Windows kernel debugging and want to start working with them.</p>\n<h2 id=\"about-the-content-of-this-book\" style=\"position:relative;\"><a href=\"#about-the-content-of-this-book\" aria-label=\"about the content of this book permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>About the Content of This Book</h2>\n<p>As mentioned above, this book uses a CTF Reversing challenge as its theme to introduce Windows user-mode and kernel-mode debugging techniques with WinDbg.</p>\n<p>Windows debugging, especially kernel debugging, requires broad prerequisite knowledge about how Windows OS and programs work.</p>\n<p>However, since there are already several high-quality introductory resources covering those prerequisites, this book does not discuss them in detail.</p>\n<p>Likewise, I do not go into detail about how to operate WinDbg itself, such as its debugger commands, because the built-in help and the <a href=\"https://learn.microsoft.com/ja-jp/windows-hardware/drivers/debugger/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">official documentation</a><sup id=\"fnref-3\"><a href=\"#fn-3\" class=\"footnote-ref\">3</a></sup> already cover those topics well.</p>\n<p>That said, for prerequisite knowledge that is needed for analysis, I introduce reference sources in footnotes whenever possible.</p>\n<p>In short, this book treats prerequisite knowledge and tool operation details as supporting references and focuses as much as possible on Windows debugging itself.</p>\n<p>This book analyzes an executable program and a kernel driver module modeled after a CTF Reversing challenge through the following steps.</p>\n<ul>\n<li>In Chapter 2, we perform surface analysis of the target programs to understand their overall nature and file types.</li>\n<li>In Chapter 3, we use analysis tools such as Binary Ninja to perform static analysis of the user-mode program.</li>\n<li>In Chapter 4, based on the results of Chapter 3, we use WinDbg to debug the user-mode program and obtain the correct Flag.</li>\n<li>In Chapter 5, we again use tools such as Binary Ninja to perform static analysis of the kernel driver module.</li>\n<li>In Chapter 6, based on the results of Chapter 5, we use WinDbg to perform Windows kernel debugging and obtain the correct Flag.</li>\n</ul>\n<h2 id=\"reference-books-for-windows-debugging\" style=\"position:relative;\"><a href=\"#reference-books-for-windows-debugging\" aria-label=\"reference books for windows debugging permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reference Books for Windows Debugging</h2>\n<p>Here I would like to introduce several reference books for readers who are interested in debugging Windows programs, including topics not covered in this book.</p>\n<p>I cannot cover everything, but I hope these references will be helpful for readers who are just getting started with Windows program debugging.</p>\n<p>“Analysis Magical Girl Misaki-chan: Magical Open!” <sup id=\"fnref-4\"><a href=\"#fn-4\" class=\"footnote-ref\">4</a></sup> and “An Introduction to x86 Program Analysis with a Debugger: x64-Compatible Edition” <sup id=\"fnref-5\"><a href=\"#fn-5\" class=\"footnote-ref\">5</a></sup> do not use WinDbg, but I recommend them because they clearly explain introductory topics in Windows user-mode debugging.</p>\n<p>In addition, “Inside Windows Debugging” <sup id=\"fnref-8\"><a href=\"#fn-8\" class=\"footnote-ref\">8</a></sup> and “Advanced Windows Debugging” <sup id=\"fnref-9\"><a href=\"#fn-9\" class=\"footnote-ref\">9</a></sup> are both English-language books, but they are among the few books that explain debugging techniques using WinDbg in detail, including kernel debugging.</p>\n<p>“Advanced Windows Debugging” is somewhat old, but it supports parts of Windows Vista, and much of its information can still be used as-is on modern operating systems.</p>\n<p>In addition, “インサイド Windows 第 7 版 上・下” <sup id=\"fnref-10\"><a href=\"#fn-10\" class=\"footnote-ref\">10</a></sup> <sup id=\"fnref-11\"><a href=\"#fn-11\" class=\"footnote-ref\">11</a></sup> is also one of the most useful books for examining the details of Windows components.</p>\n<p>Furthermore, “Practical Malware Analysis” <sup id=\"fnref-12\"><a href=\"#fn-12\" class=\"footnote-ref\">12</a></sup> and “The Art of Memory Forensics” <sup id=\"fnref-13\"><a href=\"#fn-13\" class=\"footnote-ref\">13</a></sup> also cover kernel debugging with WinDbg and undocumented Windows internals in detail, making them extremely valuable references.</p>\n<h2 id=\"about-the-author\" style=\"position:relative;\"><a href=\"#about-the-author\" aria-label=\"about the author permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>About the Author</h2>\n<p>I am Kashiwaba (@kash1064).</p>\n<p>I love security, and I am particularly interested in reverse engineering and digital forensics.</p>\n<p>My main certifications are CISSP and OSCP.</p>\n<p>As a hobby, I participate in security competitions called Capture The Flag (CTF) on a team called 0nePadding.</p>\n<p>I spend my time learning about binary analysis, log analysis, and troubleshooting techniques, and among those I especially enjoy analyzing Windows programs and system dump files.</p>\n<p>I also introduced Windows dump analysis techniques in “Magical WinDbg -雰囲気で楽しむ Windows ダンプ解析とトラブルシューティング-” <sup id=\"fnref-1\"><a href=\"#fn-1\" class=\"footnote-ref\">1</a></sup>, which I distributed at Tech Book Fest 15.</p>\n<p>I also introduced Windows dump analysis techniques in “Magical WinDbg - Enjoying Windows Dump Analysis and Troubleshooting by Feel -” <sup id=\"fnref-1\"><a href=\"#fn-1\" class=\"footnote-ref\">1</a></sup>, which I distributed at Tech Book Fest 15.</p>\n<p>Although I belong to Microsoft Japan, everything written in this book reflects my personal views and does not represent the views of the company or organization I belong to, nor is it stealth marketing for any particular product or service.</p>\n<p>All content in this book is based on information from official documentation and other websites, or from publicly available books and similar sources.</p>\n<p>Whenever I refer to technical topics in this book, I cite sources in footnotes whenever possible.</p>\n<h2 id=\"acknowledgements\" style=\"position:relative;\"><a href=\"#acknowledgements\" aria-label=\"acknowledgements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Acknowledgements</h2>\n<p>I received tremendous support from the members of the CTF team 0nePadding while writing this book.</p>\n<p>I would like to express my sincere gratitude to <code class=\"language-text\">@r1k0t3k1</code> and <code class=\"language-text\">@salty_byte</code>, both members of 0nePadding, for helping with proofreading.</p>\n<div class=\"footnotes\">\n<hr>\n<ol>\n<li id=\"fn-1\">\n<p>Magical WinDbg - Enjoying Windows Dump Analysis and Troubleshooting by Feel - <a href=\"https://techbookfest.org/product/bnaHM8sVz6AfEiF8jgpELj\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://techbookfest.org/product/bnaHM8sVz6AfEiF8jgpELj</a></p>\n<a href=\"#fnref-1\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-2\">\n<p>JavaScript Debugger Scripting <a href=\"https://learn.microsoft.com/ja-jp/windows-hardware/drivers/debugger/javascript-debugger-scripting\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://learn.microsoft.com/ja-jp/windows-hardware/drivers/debugger/javascript-debugger-scripting</a></p>\n<a href=\"#fnref-2\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-3\">\n<p>Microsoft Learn <a href=\"https://learn.microsoft.com/ja-jp/windows-hardware/drivers/debugger/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://learn.microsoft.com/ja-jp/windows-hardware/drivers/debugger/</a></p>\n<a href=\"#fnref-3\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-4\">\n<p>Analysis Magical Girl Misaki-chan: Magical Open! (Yaneura Analysis Team / Shuwa System / 2004)</p>\n<a href=\"#fnref-4\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-5\">\n<p>An Introduction to x86 Program Analysis with a Debugger: x64-Compatible Edition (Digital Travesia administrator Usapyon / Shuwa System / 2018)</p>\n<a href=\"#fnref-5\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-6\">\n<p>Detailed Security Contest: Learning Vulnerability Exploitation Techniques through CTFs (Tsubasa Umenai, Yutaro Shimizu, Yudai Fujiwara, Yuto Maeda, Takashi Yoneuchi, Yu Watanabe / Mynavi Publishing / 2021)</p>\n<a href=\"#fnref-6\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-8\">\n<p>Inside Windows Debugging (Tarik Soulami 著 / Microsoft Press / 2012 年)</p>\n<a href=\"#fnref-8\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-9\">\n<p>Advanced Windows Debugging (Daniel Hewardt, Mario Pravat 著 / 2007 年)</p>\n<a href=\"#fnref-9\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-10\">\n<p>インサイド Windows 第 7 版 上 (Pavel Yosifovich, Alex Ionescu, Mark E. Russinovich, David A. Solomon 著 / 山内 和朗 訳 / 日系 BP 社 / 2018 年)</p>\n<a href=\"#fnref-10\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-11\">\n<p>インサイド Windows 第 7 版 下 (Andrea Allievi, Alex Ionescu 著 / 山内 和朗 訳 / 日系 BP 社 / 2022 年)</p>\n<a href=\"#fnref-11\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-12\">\n<p>Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Michael Sikorski, Andrew Honig 著 / No Starch Press / 2012 年)</p>\n<a href=\"#fnref-12\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-13\">\n<p>The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and MAC Memory (Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters 著 / John Wiley &#x26; Sons Inc / 2014 年)</p>\n<a href=\"#fnref-13\" class=\"footnote-backref\">↩</a>\n</li>\n</ol>\n</div>","fields":{"slug":"/magical-windbg-vol2-00-en","tagSlugs":["/tag/magical-win-dbg/","/tag/windows/","/tag/win-dbg/","/tag/english/"]},"frontmatter":{"date":"2024-07-14","description":"This is the web edition of Magical WinDbg 2 - Learn User-Mode & Kernel Debugging Through CTFs -, distributed at Tech Book Fest 16.","tags":["Magical WinDbg","Windows","WinDbg","English"],"title":"Magical WinDbg 2 - Learn User-Mode & Kernel Debugging Through CTFs - (Web Edition)","socialImage":{"publicURL":"/static/e9bfc3718fd53ab58623a496fc9a302e/magical-windbg-vol2.png"}}}},"pageContext":{"slug":"/magical-windbg-vol2-00-en"}},"staticQueryHashes":["251939775","401334301","825871152"]}