Practical Reverse Engineering Exercise Solutions: LiveKd / WinDbg Cheat Sheet
Contents
Here are a couple of commands I regularly use for reverse engineering:
uf <function>: Unassemble functiondt nt!_ktss: Show the definition of the data structure_ktss?? sizeof(_ktss): Show the size the data structure_ktssoccupies in memory.hh uf: Show help for the functionufx nt!*createfile*: Search all functions having the stringcreatefilein its name!vtop <PDPT-pointer> <virtualAddress>: Compute physical address of given virtual address and the pointer to the page directory pointer table