Practical Reverse Engineering Exercise Solutions: LiveKd / WinDbg Cheat Sheet
Contents
Here are a couple of commands I regularly use for reverse engineering:
uf <function>
: Unassemble functiondt nt!_ktss
: Show the definition of the data structure_ktss
?? sizeof(_ktss)
: Show the size the data structure_ktss
occupies in memory.hh uf
: Show help for the functionuf
x nt!*createfile*
: Search all functions having the stringcreatefile
in its name!vtop <PDPT-pointer> <virtualAddress>
: Compute physical address of given virtual address and the pointer to the page directory pointer table