In the previous chapters, we have already played with windbg, and I have briefly discussed a windbg extension / plugin from Microsoft, which will evaluate crashes and will tell you if they think the crash is exploitable or not. ![]() scripting tools such as perl / python, etc.pyDbg (if you are using python and want to build your own custom debugger, as explained in the awesome Gray Hay Python book.windbg (for a list of Windbg commands, click here).A typical exploit writing toolkit arsenal should at least contain the following tools : ![]() ![]() Today, I will discuss some other debuggers and debugger plugins that will help you speed up this process. In the first parts of this exploit writing tutorial, I have mainly used Windbg as a tool to watch registers and stack contents while evaluating crashes and building exploits.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |