implemented, because the Windows drivers are running on the RING0 layer, the Debug and counter-debug confrontations are also performed directly on the RING0 layer.Therefore, as long as the permissions are higher than the RING0 layer, then you can completely block other programs to debug our program.Purpose: Even if the implementation of the program code is well known, no other software can detect it.Steps to implement hardware virtualization:Cpuid.1:ecx. Vmx[bit 5]=1, which is the result of the
@ redhat62 elf] $ ldd-v-r./mainOLibc. so.6 =>/lib/libc. so.6 (0x4001c000) s @ h/Lib/ld-linux.so.2>/lib/ld-linux.so.2 (0x40000000) nA = m0K [? MVersion information: ^;./Main: j3YLibc. so.6 (GLIBC_2.0) =>/lib/libc. so.6g/Lib/libc. so.6: n6Ld-linux.so.2 (GLIBC_2.1.1) =>/lib/ld-linux.so.2 {uELd-linux.so.2 (GLIBC_2.1) =>/lib/ld-linux.so.2 (>! 6P7Ld-linux.so.2 (GLIBC_2.0) =>/lib/ld-linux.so.2rJ6 |/* Trace the usage of library functions. They are all standard library functions of glibc. sotruss is in
Displays the stack of processes specified by the pid.
Bta: displays the stacks of all processes
Format: bta
Register
Register Commands include rd and rm commands for displaying and modifying the register content, and ef commands for displaying abnormal frames.
Rd: Display register content
Format: rd [c | d | u]
Wit
: The task register. It is used to store the task status segment and select a child to indicate the position of the task status segment descriptor in gdt (similar to ldtr ). Usage is similar to ldtr: In TR, select Sub-, CPUAutomatically retrieves the task status segment descriptor from gdt and puts it into the cache to create a TSS for the current task. Tss is the task state.Short for a segment (Task status segment), which defines the information required to start a task. In short, it is (inaccu
The new HMC 7310-cr4 is somewhat different from the original 7310-c03. The main reason is that xserver 3550 is displayed directly, and there is only one SATA hard disk locally.
The machine is preinstalled with 6.1.3, and the interface is much worse than V7. Therefore, 7.3.4 is downloaded directly. Then reinstall. Everything went smoothly.
The terminal window cannot be opened before the reinstallation. When you select Open terminal windows, the followi
allowed and the NW flag in the control register Cr0 is cleared. PWT indicates that when 0 is cleared, the page table or page is allowed to be written back to the cache, while when 1 is set, the cache is written.
5,Control the PCD and PWT flags in the register S3.-- Control global cache and write policies for the page Directory (see section 2.5 ). The PCD mark allows cache for the page Directory when 0 is cleared, and the cache is disabled when 1 is set. The PWT mark allows the write-back cache
involved, the D-bit of the page table item is set. Similar to the access bit, only the software can reset. -PS (7) -- used only for page Directory items. If the value is 1, the page Directory items point to the 2 MB/4 MB page box. -PAT (7) -- (Pentium III processor) Select a PAT (page attribue table) item, select a PAT table item with the pcd pwt, and then select the memory type of the page. -G (8) -- (introduced by Pentium Pro) 1 indicates a global page. This prevents common pages from being r
memory page marked as read-only, if we set the WP bit to 0, we can disable the write protection function.
The 16th bits of Cr0 are WP bits. If this position is set to 0, write protection can be disabled, and 1 can be restored.
The inline assembly code for disabling and enabling write protection is as follows:// Disable write Protection_ ASM{CLI;MoV eax, Cr0And eax ,~ 0x10000 // and eax, 0 xfffeffffMoV Cr0, eax}
// Restore write Protection_ ASM{MoV eax, Cr0Or eax, 0x10000MoV Cr0, eaxSTI;}
Note t
research needs, please use http://www.google.com search.
Wktvbdebugger 1.4e
Tools used to dynamically crack the VB p-Code Program
Debugger for other platforms
Linice 2.6
Debugger http://www.linice.com on liunix Platform
Debugging tools
Xidt 2.0 + source code
Supports Win2k/XP/2003 for backup and IDT recovery. There are four buttons on the main interface: Show: view the current IDT. Save: Archive: Save the current IDT to the file. Load: Read Fil
, such as Io-apic, local IRQ, Lapic;
Turn off non-No. 0 CPU cores;
Clear the TLB (here the following code for the Assembly implementation, concrete implementation of arch-related, generally called relocate_new_kernel);
Set up segment register, GDT, IDT, etc.;
Create a new stack and press the entry address of the new kernel into the stack;
Set CR0 Register: Enable paging function and page protection function;
Set CR4 Register: E
, can be addressed by the same linear address as the physical address, or by the 8MB linear address starting from 0xc0000000 to the 8MB of RAM.When RAM is less than 896MB, the final kernel page table provided by the Kernel page table must be converted from a linear address starting with 0xc0000000 to a physical address starting at 0.Macro __PA is used to convert a linear address starting from Page_offset to the corresponding physical address, while the macro __va does the opposite conversion.The
of the system, then turns on the virtualization mode switch in the CPU control register CR4 and places the host operating system (including the KVM module itself) in the root mode of the virtualization mode by executing the vmxon instruction;
Next, the creation and operation of the virtual machine will be a process of interacting with the user-space application (QEMU) and the KVM module.
KVM module and user space Qemu is mainly a seri
Cr1*
1
Control registers A
CR2
10
Control Register Two
CR3
11
Control Registers Three
CR4
100
Control Register Four
cr5*
101
Control registers Five
cr6*
110
Control Register Six
cr7*
111
Control Register VII
Debug Registers
DR0
0
Debug Register Zero
DR1
1
Debug Register
the MBR and the body portion of the disk's other sectors. Taking "ghost" virus as an example, the main part of the virus is stored in the boot area, and the 0x228 sector is not used by the system, and its contents are encrypted. The "Mordor" virus establishes a separate partition at the end of the user's disk, and the file system used by the partition is also a custom file system. This partition from the disk partition table is not query, in other words, the partition for the user and the syste
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.