{"componentChunkName":"component---src-templates-post-template-js","path":"/magical-windbg-vol2-02-en","result":{"data":{"markdownRemark":{"id":"7746a17e-6b05-5df0-8011-db070807d2f1","html":"<blockquote>\n<p>This page has been machine-translated from the <a href=\"/magical-windbg-vol2-02\">original page</a>.</p>\n</blockquote>\n<p>This chapter performs surface analysis of DoPClient and DoPDriver, the programs analyzed in this book.</p>\n<p>Surface analysis generally refers to analysis methods that use information such as program metadata and strings contained in a file to understand the overall nature of the target.</p>\n<p>For example, when you perform surface analysis on Windows executables, you can identify the following kinds of information.</p>\n<ul>\n<li>Information about the type of executable file</li>\n<li>Configuration information contained in the executable header</li>\n<li>Information about DLLs loaded by the executable and the Windows APIs it uses</li>\n<li>Information about strings defined inside the executable</li>\n</ul>\n<!-- omit in toc -->\n<h2 id=\"table-of-contents\" style=\"position:relative;\"><a href=\"#table-of-contents\" aria-label=\"table of contents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Table of Contents</h2>\n<ul>\n<li><a href=\"#identify-the-file-type\">Identify the File Type</a></li>\n<li><a href=\"#examine-pe-file-information\">Examine PE File Information</a></li>\n<li><a href=\"#summary-of-chapter-2\">Summary of Chapter 2</a></li>\n<li><a href=\"#links-to-each-chapter\">Links to Each Chapter</a></li>\n</ul>\n<h2 id=\"identify-the-file-type\" style=\"position:relative;\"><a href=\"#identify-the-file-type\" aria-label=\"identify the file type permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identify the File Type</h2>\n<p>The type of the target file can be identified through surface analysis.</p>\n<p>On Linux, commands such as <code class=\"language-text\">file</code>, which are installed on many distributions, can easily identify the type of a target file.</p>\n<p>On Windows, by contrast, it is common to use third-party tools to examine file types.</p>\n<p>This book does not cover file-type investigation tools in detail, but TrID <sup id=\"fnref-1\"><a href=\"#fn-1\" class=\"footnote-ref\">1</a></sup> is one commonly used option.</p>\n<p>TrID is also provided as an online tool, so it is convenient when it is acceptable to upload the file being analyzed to an external site, as in this case.</p>\n<br>\n<p>Online TrID File Identifier:</p>\n<p><a href=\"https://mark0.net/onlinetrid.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://mark0.net/onlinetrid.html</a></p>\n<br>\n<p>When the executables analyzed in this book are checked with the online tool above, they are identified as likely 64-bit Windows executables, as shown below.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 960px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/0c90a13d1feeaed98159f43a1f578363/72aae/result-of-trid.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 25%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAFCAYAAABFA8wzAAAACXBIWXMAAA7DAAAOwwHHb6hkAAAA90lEQVQY032NAVOCQBCF+f+/qmnKCAXhvAMOFdTBJDIRRkwt/Tqdsamm6e28fbuzb3ctpSRRFKETTRgqtI5RUlJVFWecTsdzvsRVvwe/aBXFM3k+p1qtaeoNP3Di//4PWF1vguMW3D9meKJEqBoRNgRqyZ09wgtKpOkdt6TjLHCDFhm9E8gD/uBg/B/0RW1mqfHOseI0xfFLeoMETyp6QuFHCVFqHvmCfhjjG9rukk5vw83DxmjLrd3SFS3jfMdwtsQ1u0IPsWZFTpyt0dmUZJqaekS2yHl6Lc3RoTFn6MmYl6Zmvd9RvW2/WO+3tMcdZbO67I7zGZ/Au3LHJhd+EAAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/0c90a13d1feeaed98159f43a1f578363/8ac56/result-of-trid.webp 240w,\n/static/0c90a13d1feeaed98159f43a1f578363/d3be9/result-of-trid.webp 480w,\n/static/0c90a13d1feeaed98159f43a1f578363/e46b2/result-of-trid.webp 960w,\n/static/0c90a13d1feeaed98159f43a1f578363/6bfb6/result-of-trid.webp 964w\"\n              sizes=\"(max-width: 960px) 100vw, 960px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/0c90a13d1feeaed98159f43a1f578363/8ff5a/result-of-trid.png 240w,\n/static/0c90a13d1feeaed98159f43a1f578363/e85cb/result-of-trid.png 480w,\n/static/0c90a13d1feeaed98159f43a1f578363/d9199/result-of-trid.png 960w,\n/static/0c90a13d1feeaed98159f43a1f578363/72aae/result-of-trid.png 964w\"\n            sizes=\"(max-width: 960px) 100vw, 960px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/0c90a13d1feeaed98159f43a1f578363/d9199/result-of-trid.png\"\n            alt=\"TrID analysis result\"\n            title=\"TrID analysis result\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Note: Uploading files that are not publicly available to Internet-based analysis sites can become a serious security incident, so please use such sites with great care.</p>\n<h2 id=\"examine-pe-file-information\" style=\"position:relative;\"><a href=\"#examine-pe-file-information\" aria-label=\"examine pe file information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Examine PE File Information</h2>\n<p>Windows executables are normally created in the PE file format <sup id=\"fnref-2\"><a href=\"#fn-2\" class=\"footnote-ref\">2</a></sup>.</p>\n<p>PE file headers contain a wide variety of information about the executable.</p>\n<p>This book does not explain PE file headers in detail, but in general you can inspect the following kinds of information from a PE header.</p>\n<ul>\n<li>Information about functions and data exported by the executable</li>\n<li>Information about library functions and data imported by the executable</li>\n<li>Debug information for the executable</li>\n</ul>\n<p>In addition, by analyzing data inside the executable, you can inspect the following kinds of information as well.</p>\n<ul>\n<li>Data such as strings embedded in the executable</li>\n<li>Data that may be encrypted or obfuscated inside the executable</li>\n</ul>\n<p>Now let’s actually try some surface analysis on DoPClient and DoPDriver.</p>\n<p>There are several tools that can be used for surface analysis of Windows programs, but in this book we use the free edition of PEStudio <sup id=\"fnref-3\"><a href=\"#fn-3\" class=\"footnote-ref\">3</a></sup>.</p>\n<p>There are also several useful tools for surface analysis of Windows programs besides PEStudio.</p>\n<p>This book does not use them, but CFF Explorer included in Explorer Suite <sup id=\"fnref-4\"><a href=\"#fn-4\" class=\"footnote-ref\">4</a></sup> and PE Bear are also extremely useful tools.</p>\n<p>When you analyze DoPClient and DoPDriver with PE Studio, a wide range of information is displayed at once, as shown in the image below.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 960px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/7f7fe69f499c0ffcb3f5fdfa939319af/9de76/result-of-pestudio-001.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 77.91666666666667%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/7f7fe69f499c0ffcb3f5fdfa939319af/8ac56/result-of-pestudio-001.webp 240w,\n/static/7f7fe69f499c0ffcb3f5fdfa939319af/d3be9/result-of-pestudio-001.webp 480w,\n/static/7f7fe69f499c0ffcb3f5fdfa939319af/e46b2/result-of-pestudio-001.webp 960w,\n/static/7f7fe69f499c0ffcb3f5fdfa939319af/fb6f1/result-of-pestudio-001.webp 1423w\"\n              sizes=\"(max-width: 960px) 100vw, 960px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/7f7fe69f499c0ffcb3f5fdfa939319af/8ff5a/result-of-pestudio-001.png 240w,\n/static/7f7fe69f499c0ffcb3f5fdfa939319af/e85cb/result-of-pestudio-001.png 480w,\n/static/7f7fe69f499c0ffcb3f5fdfa939319af/d9199/result-of-pestudio-001.png 960w,\n/static/7f7fe69f499c0ffcb3f5fdfa939319af/9de76/result-of-pestudio-001.png 1423w\"\n            sizes=\"(max-width: 960px) 100vw, 960px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/7f7fe69f499c0ffcb3f5fdfa939319af/d9199/result-of-pestudio-001.png\"\n            alt=\"Result of analysis with PE Studio\"\n            title=\"Result of analysis with PE Studio\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>From here, you can inspect information such as hashes and timestamps for the target files.</p>\n<p>You can also inspect the strings embedded in DoPClient by opening the [strings] tab for DoPClient.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 960px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/3d70b846a9cabaf329937c38bd81b5b7/350de/result-of-pestudio-002.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 38.33333333333333%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/3d70b846a9cabaf329937c38bd81b5b7/8ac56/result-of-pestudio-002.webp 240w,\n/static/3d70b846a9cabaf329937c38bd81b5b7/d3be9/result-of-pestudio-002.webp 480w,\n/static/3d70b846a9cabaf329937c38bd81b5b7/e46b2/result-of-pestudio-002.webp 960w,\n/static/3d70b846a9cabaf329937c38bd81b5b7/7a915/result-of-pestudio-002.webp 998w\"\n              sizes=\"(max-width: 960px) 100vw, 960px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/3d70b846a9cabaf329937c38bd81b5b7/8ff5a/result-of-pestudio-002.png 240w,\n/static/3d70b846a9cabaf329937c38bd81b5b7/e85cb/result-of-pestudio-002.png 480w,\n/static/3d70b846a9cabaf329937c38bd81b5b7/d9199/result-of-pestudio-002.png 960w,\n/static/3d70b846a9cabaf329937c38bd81b5b7/350de/result-of-pestudio-002.png 998w\"\n            sizes=\"(max-width: 960px) 100vw, 960px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/3d70b846a9cabaf329937c38bd81b5b7/d9199/result-of-pestudio-002.png\"\n            alt=\"String information in DoPClient\"\n            title=\"String information in DoPClient\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>From strings such as <code class=\"language-text\">Password is Wrong</code>, <code class=\"language-text\">DoPDriver.sys</code>, and <code class=\"language-text\">StartService failed (%d)</code>, we can infer that this program may validate a password and load or start DoPDriver.sys.</p>\n<p>Furthermore, the [imports] tab of DoPClient confirms that the target program imports API functions such as <code class=\"language-text\">OpenSCManager</code> and <code class=\"language-text\">CreateService</code>.</p>\n<p>Next, let’s look at the analysis results for DoPDriver.</p>\n<p>In DoPDriver, it appears that the developer forgot to remove information about the debug information file (the PDB file), and we can see that the debug area of the Data Directory section in the PE file contains the file path <code class=\"language-text\">C:\\Users\\kash1064\\Documents\\DoP\\x64\\Release\\DoPDriver.pdb</code>, which includes a user name.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 890px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/b591fcacb79b33cbf45c011ae43062aa/4ef49/result-of-pestudio-003.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.75%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/b591fcacb79b33cbf45c011ae43062aa/8ac56/result-of-pestudio-003.webp 240w,\n/static/b591fcacb79b33cbf45c011ae43062aa/d3be9/result-of-pestudio-003.webp 480w,\n/static/b591fcacb79b33cbf45c011ae43062aa/8d1ba/result-of-pestudio-003.webp 890w\"\n              sizes=\"(max-width: 890px) 100vw, 890px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/b591fcacb79b33cbf45c011ae43062aa/8ff5a/result-of-pestudio-003.png 240w,\n/static/b591fcacb79b33cbf45c011ae43062aa/e85cb/result-of-pestudio-003.png 480w,\n/static/b591fcacb79b33cbf45c011ae43062aa/4ef49/result-of-pestudio-003.png 890w\"\n            sizes=\"(max-width: 890px) 100vw, 890px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/b591fcacb79b33cbf45c011ae43062aa/4ef49/result-of-pestudio-003.png\"\n            alt=\"Information from DoPDriver&#39;s debug directory\"\n            title=\"Information from DoPDriver&#39;s debug directory\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>And from the [strings] tab of DoPDriver, we can confirm that the string <code class=\"language-text\">FLAG{The_important_process_is_</code> is defined.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 960px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/bdf34fa22f9240d67353b3b613bc00fb/2bef9/result-of-pestudio-004.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 32.916666666666664%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAHCAYAAAAIy204AAAACXBIWXMAAA7DAAAOwwHHb6hkAAABJklEQVQoz11RCY6DMAzM/9/UL/QB212JAiIk3IWGKwmztrdU1VqyHDuj8WSi0iTB/eeGMs+R0VlnOeqqQlmWsNZCay21aRrUdS1nY4z0gjEWFeGfzyfGcYQqsgz6nqEpDfy8ICwLHF1u24bgg1QGxxjhvce6rgghSPJsnmchbJoW+75DWaORpwmKPBUwx+PxQNd1mIl8miZSZAXM90zAlZNnwzAgvafQRYG2baF6a9Bl3xjKFNvihNA5J+DjOEQVK+RzpJRKyjg5FlrKWA6eqZZ8qGnDNE4C/iRkAFch3D3CtsuC/4R9378FKH6ee3l0hnMvD8mnkzCuRDavsuyTkPvb100+yBNe6esVxeWCSM0Z7NOpkBVxfz71b368CdlL/n32kgX8Ah/lG4PuYkbeAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/bdf34fa22f9240d67353b3b613bc00fb/8ac56/result-of-pestudio-004.webp 240w,\n/static/bdf34fa22f9240d67353b3b613bc00fb/d3be9/result-of-pestudio-004.webp 480w,\n/static/bdf34fa22f9240d67353b3b613bc00fb/e46b2/result-of-pestudio-004.webp 960w,\n/static/bdf34fa22f9240d67353b3b613bc00fb/a9a89/result-of-pestudio-004.webp 1024w\"\n              sizes=\"(max-width: 960px) 100vw, 960px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/bdf34fa22f9240d67353b3b613bc00fb/8ff5a/result-of-pestudio-004.png 240w,\n/static/bdf34fa22f9240d67353b3b613bc00fb/e85cb/result-of-pestudio-004.png 480w,\n/static/bdf34fa22f9240d67353b3b613bc00fb/d9199/result-of-pestudio-004.png 960w,\n/static/bdf34fa22f9240d67353b3b613bc00fb/2bef9/result-of-pestudio-004.png 1024w\"\n            sizes=\"(max-width: 960px) 100vw, 960px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/bdf34fa22f9240d67353b3b613bc00fb/d9199/result-of-pestudio-004.png\"\n            alt=\"String information in DoPDriver\"\n            title=\"String information in DoPDriver\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>This looks like the first half of the correct Flag, and it seems likely to become an important keyword as we continue the analysis.</p>\n<h2 id=\"summary-of-chapter-2\" style=\"position:relative;\"><a href=\"#summary-of-chapter-2\" aria-label=\"summary of chapter 2 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summary of Chapter 2</h2>\n<p>In this chapter, we used PEStudio to perform surface analysis of DoPClient and DoPDriver, the programs targeted in this book.</p>\n<p>Although it did not appear in this chapter, surface analysis can sometimes reveal even more information, such as sensitive data embedded as text or data that may be encrypted or obfuscated.</p>\n<p>For various techniques related to surface analysis of Windows programs, “リバースエンジニアリングツール Ghidra 実践ガイド” <sup id=\"fnref-6\"><a href=\"#fn-6\" class=\"footnote-ref\">6</a></sup> and “Practical Malware Analysis” <sup id=\"fnref-7\"><a href=\"#fn-7\" class=\"footnote-ref\">7</a></sup> are extremely helpful references.</p>\n<h2 id=\"links-to-each-chapter\" style=\"position:relative;\"><a href=\"#links-to-each-chapter\" aria-label=\"links to each chapter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Links to Each Chapter</h2>\n<ul>\n<li><a href=\"/magical-windbg-vol2-00-en\">Preface</a></li>\n<li><a href=\"/magical-windbg-vol2-01-en\">Chapter 1: Environment Setup</a></li>\n<li><a href=\"/magical-windbg-vol2-02-en\">Chapter 2: Surface Analysis of DoPClient and DoPDriver</a></li>\n<li><a href=\"/magical-windbg-vol2-03-en\">Chapter 3: Static Analysis of DoPClient</a></li>\n<li><a href=\"/magical-windbg-vol2-04-en\">Chapter 4: Dynamic Analysis of DoPClient</a></li>\n<li><a href=\"/magical-windbg-vol2-05-en\">Chapter 5: Static Analysis of DoPDriver</a></li>\n<li><a href=\"/magical-windbg-vol2-06-en\">Chapter 6: Dynamic Analysis of DoPDriver</a></li>\n</ul>\n<div class=\"footnotes\">\n<hr>\n<ol>\n<li id=\"fn-1\">\n<p>TrID - File Identifier <a href=\"https://mark0.net/soft-trid-e.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://mark0.net/soft-trid-e.html</a></p>\n<a href=\"#fnref-1\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-2\">\n<p>PE Format <a href=\"https://learn.microsoft.com/ja-jp/windows/win32/debug/pe-format\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://learn.microsoft.com/ja-jp/windows/win32/debug/pe-format</a></p>\n<a href=\"#fnref-2\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-3\">\n<p>PEStudio <a href=\"https://www.winitor.com/download\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://www.winitor.com/download</a></p>\n<a href=\"#fnref-3\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-4\">\n<p>Explorer Suite <a href=\"https://ntcore.com/explorer-suite/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://ntcore.com/explorer-suite/</a></p>\n<a href=\"#fnref-4\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-5\">\n<p>PE Bear <a href=\"https://github.com/hasherezade/pe-bear\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://github.com/hasherezade/pe-bear</a></p>\n<a href=\"#fnref-5\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-6\">\n<p>リバースエンジニアリングツール Ghidra 実践ガイド セキュリティコンテスト入門からマルウェア解析まで (中島 将太, 小竹 泰一, 原 弘明, 川畑 公平 著 / マイナビ出版 / 2020 年)</p>\n<a href=\"#fnref-6\" class=\"footnote-backref\">↩</a>\n</li>\n<li id=\"fn-7\">\n<p>Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Michael Sikorski, Andrew Honig 著 / No Starch Press / 2012 年)</p>\n<a href=\"#fnref-7\" class=\"footnote-backref\">↩</a>\n</li>\n</ol>\n</div>","fields":{"slug":"/magical-windbg-vol2-02-en","tagSlugs":["/tag/magical-win-dbg/","/tag/windows/","/tag/win-dbg/","/tag/english/"]},"frontmatter":{"date":"2024-05-26","description":"This is the web edition of Magical WinDbg 2 - Learn User-Mode & Kernel Debugging Through CTFs -, distributed at Tech Book Fest 16.","tags":["Magical WinDbg","Windows","WinDbg","English"],"title":"Magical WinDbg VOL.2 [Chapter 2: Surface Analysis of DoPClient and DoPDriver]","socialImage":{"publicURL":"/static/e9bfc3718fd53ab58623a496fc9a302e/magical-windbg-vol2.png"}}}},"pageContext":{"slug":"/magical-windbg-vol2-02-en"}},"staticQueryHashes":["251939775","401334301","825871152"]}