You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# WinDbg Integration:
1. Find base address in debugger: lm m notepad
2. IDA: Edit → Segments → Rebase program
3. Enter new base address
4. Use G command to jump to debugger addresses
Address Translation
Tool
Command
Purpose
WinDbg
lm m module
Get module base
IDA
G → address
Jump to address
IDA
Edit → Segments → Rebase
Sync addresses
🚨 Common Workflows
Basic Analysis Workflow
1. Load File → Select appropriate processor type
2. Wait for auto-analysis to complete
3. Navigate to entry point
4. Use Graph view for code flow understanding
5. Add comments and rename functions
6. Use cross-references to trace function usage
7. Save work with "Pack database"
Vulnerability Research Workflow
1. Identify target functions (imports/strings)
2. Cross-reference critical functions
3. Analyze input validation routines
4. Look for buffer operations
5. Trace data flow paths
6. Document findings with comments/colors
Malware Analysis Workflow
1. Start with strings analysis
2. Examine import table
3. Locate main execution path
4. Identify obfuscation techniques
5. Trace network/file operations
6. Document IOCs and behavior
📋 Useful Code Patterns
Function Prologue/Epilogue
; Standard function prologuepushebpmovebp,espsubesp, XX ; Local variables; Standard function epilogue movesp,ebppopebpret