Nytro Posted March 23, 2012 Report Posted March 23, 2012 Deep Dive into OS Internals with WindbgMalware and OS InternalsAn approach towards reversing malwares, shellcodes and other malicious codes to understand the ways in which they use the OS Internals for their functionality.Preface ............................................................................................................................................................................3Reversing Windows Internals..........................................................................................................................................4Portable Executable Anatomy.........................................................................................................................................5Data Directories of Interest.............................................................................................................................................7Import Directory..............................................................................................................................................................8Import Address Table....................................................................................................................................................12Export Directory ............................................................................................................................................................13Manual Walkthrough of Export Directory.....................................................................................................................14Process Environment Block...........................................................................................................................................17Different methods to locate the PEB ............................................................................................................................18Understanding an Example Shellcode...........................................................................................................................20Using _PEB_LDR_DATA .................................................................................................................................................20Using _LDR_DATA_TABLE_ENTRY.................................................................................................................................23Practical Example with Rustock.B Rootkit.....................................................................................................................25Conclusion.....................................................................................................................................................................32References.....................................................................................................................................................................33Download:http://www.exploit-db.com/wp-content/themes/exploit/docs/18576.pdf Quote