| Trees | Indices | Help |
|---|
|
|
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE = 64
|
|||
gflag_stuff =
|
|||
token_elevation_types =
|
|||
__package__ =
|
|||
|
|||
Print out the TEB for the current or specified thread. Usage: teb [threadid] |
Print the PEB Usage: peb |
Show all the registry keys the target process currently has open. Usage: regkeys |
Show all the current exception information.
-P Toggle the "PendingSignal" meta key which controls
delivery (or handling) of the current exception.
Usage: einfo [options]
|
Walk and print the SEH chain for the current (or specified) thread. Usage: seh [threadid] |
Show the SafeSEH status of all the loaded DLLs or list the handlers for a particular dll by normalized name. Usage: safeseh [libname] |
Show Win32 Heap Information. Usage: heaps [-F <heapaddr>] [-C <address>] [-L <segmentaddr>] -F <heapaddr> print the freelist for the heap -C <address> Find and print the heap chunk containing <address> -S <segmentaddr> Print the chunks for the given heap segment -L <heapaddr> Print the look aside list for the given heap -V Validate the heaps (check next/prev sizes and free list) -l <heapaddr> Leak detection (list probable leaked chunks) -U <heapaddr> Show un-commited ranges for the specified heap (no options lists heaps and segments) |
Determine which PE's in the current process address space support Vista's ASLR implementation by the presence of the IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE (0x0040) bit in the DllCharacteristics field of the PE header. Usage: aslr [libname] |
Enable write access watching on a given memory page. This works by setting the page to read-only and then specially handling the access violations as though they were hardware Watchpoints. Usage: pagewatch [options] [<addr_expression>] -C - Clear the current pagewatch log -F - Toggle auto-continue behavior (run and record vs. stop on hit) -L - List the current hits from the pagewatch log -M - Add page watches to the entire memory map from addr_expression -R - Use to enable *read* watching while adding a page watch -S <addr> - Show touches to the specified address -P <addr> - Show memory touched by specifed program counter (eip) -u - When listing, show only *unique* entries |
Enable basic debugger stealth. This has the following effects: Change PEB to show BeingDebugged == 0 Special breakpoint on CheckRemoteDebuggerPresent WARNING: break/sendBreak() behave VERY strange with this because the kernel aparently doesn't think he needs to post the exception to the debugger? |
Support a subset of gflags like behavior on windows. This enables features *exclusively* by direct process manipulation and does NOT set any registry settings or persist across processes... Usage: gflags [toggle_type] NOTE: Most of these options require symbols! |
Show extended info about loaded PE binaries.
Usage: pe [opts] [<libname>...]
-I Show PE import files.
-m Toggle inmem/ondisk behavior (directly mapped DLLs)
-N Show full NT header
-t Show PE timestamp information
-E Show PE exports
-S Show PE sections
-v Show FileVersion from VS_VERSIONINFO
-V Show all keys from VS_VERSIONINFO
NOTE: "libname" may be a vtrace expression:
Examples:
# Show the imports from a PE loaded at 0x777c0000
pe -I 0x777c0000
# Show the exports from advapi32.dll
pe -E advapi32
# Show the build timestamp of the PE pointed to by a register
pe -t esi+10
|
Rebase the specified address expression as though the origin library had gotten it's suggested base address rather than being ASLR'd. Usage: deaslr <addr_expr> |
Set the symbol path for the tracer. This will currently only effect *subsequent* library loads! Usage: sympath <new_path> |
Use the extended intel hardware support to step to the next branch
target.
Usage: stepb
NOTE: This will *not* work inside VMware / VirtualBox. Other hypervisors
may vary... (it will simply single step)
|
Check the executable regions of the target process for any hooks by comparing against the PE on disk. This will account for relocations and import entries. |
Enable/Disable the current VDB location as the current Just-In-Time debugger for windows applications. Usage: jitenable [-D] -E Enable VDB JIT debugging -D Disable JIT debugging |
List the running service names and pids. Usage: svclist |
Inject a shared object (DLL) into the target process. Usage: injectso <dllname> |
Display the current UAC status of the target process. (User Account Control) Usage: uac |
Hook the specified IAT entries by munging a pointer and emulating
"breakpoint" like behavior on the resultant memory access errors. Basically,
break on import call...
Usage: hookiat <libname> [ <implibname> [ <impfuncname> ] ]
Example:
hookiat calc
hookiat calc kernel32
hookiat calc kernel32 LoadLibraryA
NOTE: Once added, you may use "bp" and commands like "bpedit" to modify,
remove, or add code to "iat hooks"
|
|
|||
gflag_stuff
|
token_elevation_types
|
| Trees | Indices | Help |
|---|
| Generated by Epydoc 3.0.1 on Fri Nov 16 18:22:10 2012 | http://epydoc.sourceforge.net |