110 likes | 341 Views
Group 2 Windows Internals tools & Windows SDK debugging tools. David Denhollander Kevin Finkler Corey Sarnia Ailun Shen. What they are Download From: http:// technet.microsoft.com/en-us/sysinternals/bb842062 To install, extract to a directory such as C:Utils
E N D
Group 2Windows Internals tools &Windows SDK debugging tools David DenhollanderKevin FinklerCorey SarniaAilun Shen
What they are • Download From: http://technet.microsoft.com/en-us/sysinternals/bb842062 • To install, extract to a directory such as C:\Utils • (Optional) Add your new directory to the PATH environment variables in order to run the programs easily from the command prompt. Windows Sysinternals
Procmon.exe • Advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. Process Monitor
VNMap.exe • Process virtual and physical memory analysis utility. • Shows a breakdown of a process’s committed virtual memory types as well as the amount of physical memory (working set) assigned by the operating system to those types. VNMap
Executable and driver used to crash your system in several different ways. • The driver enables NotMyFault.exe to cause the system to hit a bug check and reboot, generating a new crash dump in the process. NotMyFault.exe
Debugging tool for Windws • Common WinDbgcommands listed here: http://windbg.info/doc/1-common-cmds.html • WinDbg Commands • vercommand:Dump command line that was used to start the debugger • Bp: Start breakpoint at address • bpHelloWorld!wmain • Sets a breakpoint at “wmain” in HelloWorld • g: o. Runs the program, stopping at breakpoints • dv: Display local variables and parameters • r: Display the values of all the CPU registers • q / qd: Quit / Quit and Detach • x: Lists the available symbols in a loaded module • x notepad!*open* • Lists the “open” symbols in notepad • .symfix& .reload • Fixes the debugger search path and reloads the symbols for all loaded modules • k: Display the stack trace of the current thread • kP also tries to show the parameters to each function on the call stack WINDbg