Jump to content

Recommended Posts

Posted

Quickstart

 

DriverBuddy Installation Instructions

 

Copy DriverBuddy folder and DriverBuddy.py file into the IDA plugins folder C:\Program Files (x86)\IDA 6.8\plugins or wherever you installed IDA

 

DriverBuddy Usage Instructions

 

  1. Start IDA and open a Windows kernel driver
  2. Go to Edit->Plugins and select Driver Buddy or press ctrl-alt-d
  3. Check Output window for DriverBuddy analysis results
  4. To decode IOCTLs, highlight the suspected IOCTL and press ctrl-alt-i

 

DriverBuddy

 

DriverBuddy is an IDAPython plugin that helps automate some of the tedium surrounding the reverse engineering of Windows Kernel Drivers. It has a number of handy features, such as:

 

  • Identifying the type of driver
  • Locating DispatchDeviceControl and DispatchInternalDeviceControl functions
  • Populating common structs for WDF and WDM drivers
  1. Attempts to identify and label structs like the IRP and IO_STACK_LOCATION
  2. Labels calls to WDF functions that would normally be unlabeled
  • Finding known IOCTL codes and decoding them
  • Flagging functions prone to misuse

 

Link: https://github.com/nccgroup/DriverBuddy

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...