Security Basics mailing list archives
Re: Windows debugging/vulnerability analysis
From: "Rob klein Gunnewiek" <rob.kleingunnewiek () gmail com>
Date: Tue, 1 Aug 2006 11:04:26 +0200
On 7/31/06, Krpata, Tyler <tkrpata () bjs com> wrote:
Thanks for the reply. Since my original post, I did a little more research and read up on remote kernel debugging using Windbg and MS Virtual PC (both free), and emulating the serial connection through a named pipe. It seems to give me pretty much what I was looking for. Does SoftICE give me any advantages over this setup?
Sounds good. Actually I haven't used Windows (and SoftICE) in years, so I don't know what's the best option. It sounds good however. SoftICE is kernel-based, you can do the usual, like setting breakpoints on anything. I liked the interface alot. But anyway, if this Windbg/VirtualPC setup works for you then that's great. Also, if you ever need a disassembler, try IDA it's very good. But you probably know this :) -- Regards, Rob klein Gunnewiek --------------------------------------------------------------------------- This list is sponsored by: Norwich University EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINEThe NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.
http://www.msia.norwich.edu/secfocus ---------------------------------------------------------------------------
Current thread:
- Re: Windows debugging/vulnerability analysis Rob klein Gunnewiek (Aug 01)
