|
You are here |
blog.quarkslab.com | ||
| | | | |
keithbabinec.com
|
|
| | | | | It is important for software engineers to understand how to analyze process dumps so that they can determine why their application is crashing or behaving unexpectedly. However, it can be hard to know where to start with the process. This post aims to be a starting point for a very common situation: debugging a crash... | |
| | | | |
scorpiosoftware.net
|
|
| | | | | Windows provides much of its functionality via kernel objects. Common examples are processes, threads, mutexes, semaphores, sections, and many more. We can see the object types supported on a particular Windows system by using a tool such as Object Explorer, or in a more limited way - WinObj. Here is a view from Object Explorer:... | |
| | | | |
alice.climent-pommeret.red
|
|
| | | | | ||
| | | | |
www.codecentric.de
|
|
| | | Relative Path DLL Hijacking: Leverage legitimate Windows programs as a Red Teamer to run your own code. | ||