Security Basics mailing list archives

Re: Windows debugging/vulnerability analysis


From: "Rob klein Gunnewiek" <rob.kleingunnewiek () gmail com>
Date: Tue, 1 Aug 2006 11:04:26 +0200

On 7/31/06, Krpata, Tyler <tkrpata () bjs com> wrote:
Thanks for the reply. Since my original post, I did a little more
research and read up on remote kernel debugging using Windbg and MS
Virtual PC (both free), and emulating the serial connection through a
named pipe. It seems to give me pretty much what I was looking for. Does
SoftICE give me any advantages over this setup?


Sounds good. Actually I haven't used Windows (and SoftICE) in years,
so I don't know what's the best option. It sounds good however.
SoftICE is kernel-based, you can do the usual, like setting
breakpoints on anything. I liked the interface alot. But anyway, if
this Windbg/VirtualPC setup works for you then that's great. Also, if
you ever need a disassembler, try IDA it's very good. But you probably
know this :)

--
Regards,
Rob klein Gunnewiek

---------------------------------------------------------------------------
This list is sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------


Current thread: