@hyperdbg

@hyperdbg / Public archive of HyperDbg Telegram messages.

  • 2025

    • Mar 2025 (385)
    • Feb 2025 (220)
    • Jan 2025 (167)
  • 2024

    • Dec 2024 (72)
    • Nov 2024 (235)
    • Oct 2024 (83)
    • Sep 2024 (263)
    • Aug 2024 (332)
    • Jul 2024 (403)
    • Jun 2024 (570)
    • May 2024 (245)
    • Apr 2024 (156)
    • Mar 2024 (90)
    • Feb 2024 (134)
    • Jan 2024 (309)
  • 2023

    • Dec 2023 (62)
    • Nov 2023 (326)
    • Oct 2023 (76)
    • Sep 2023 (315)
    • Aug 2023 (757)
    • Jul 2023 (2215)
    • Jun 2023 (778)
    • May 2023 (300)
    • Apr 2023 (1)
    • Feb 2023 (5)
    • Jan 2023 (1)
  • 2022

    • Nov 2022 (1)
    • Oct 2022 (2)
    • Sep 2022 (1)
    • Aug 2022 (1)
    • Jul 2022 (39)
    • Jun 2022 (23)
    • May 2022 (256)
  • 2021

    • Dec 2021 (1)
    • Oct 2021 (82)
    • Jun 2021 (1)
    • Feb 2021 (1)
    • Jan 2021 (2)
  • 2020

    • Dec 2020 (1)
    • Nov 2020 (2)
RSS feed.    Made with tg-archive
  • 01 September 2023 (4 messages)
  • @xmaple555 #4634 02:25 PM, 01 Sep 2023
    hi, how can I debug hyperdbgkd while debugger mode? is it able to windbg and hyperdbg attach remote kernel at the same time ?
  • @HughEverett ↶ Reply to #4634 #4635 06:03 PM, 01 Sep 2023
    Hi,
    You can use the command 'test breakpoint off', so HyperDbg won't intercept the breakpoints anymore, thus re-inject it for other debuggers like windbg or x64dbg.
  • @HughEverett ↶ Reply to #4634 #4636 06:04 PM, 01 Sep 2023
    I also see the issue, you mentioned before, but couldn't reproduce that. 🤔
    Can you give me a simple example of a scenario (preferably kernel-mode only) so I can reproduce it?
  • @xmaple555 ↶ Reply to #4636 #4637 07:51 PM, 01 Sep 2023
    I'll dm you the sample later
  • 02 September 2023 (10 messages)
  • @AugustKit #4638 07:06 AM, 02 Sep 2023
    Joined.
  • @xmaple555 ↶ Reply to #4635 #4639 05:38 PM, 02 Sep 2023
    now I can use windbg to debug hyperdbgkd. I want to trace KdDispatchAndPerformCommandsFromDebugger, but the problem is that it takes too long for the commands like step-into in VS community .
  • @xmaple555 #4640 05:38 PM, 02 Sep 2023

    photo_2023-09-02_17-38-49.jpg
  • @montagne1337 ↶ Reply to #4640 #4641 06:33 PM, 02 Sep 2023
    hey, how did you even manage to kernel debug in visual studio, I tried many many ways but all of them unsuccessful
  • @xmaple555 #4642 06:34 PM, 02 Sep 2023
    both hyperdbg and windbg use pipename to attach
  • @HughEverett ↶ Reply to #4639 #4643 06:38 PM, 02 Sep 2023
    It's basically the reason why WinDbg is not a good debugger for debugging HyperDbg. Only sometimes it works and you cannot perform multiple steppings because in most of the cases after 4, 5 or more instructions it will be halted and never returns again. The reason why is because WinDbg is not designed to debug VMX-root mode routines like this.
  • @HughEverett #4644 06:39 PM, 02 Sep 2023
    I use serial device for debugging HyperDbg, you have functions like LogInfo() which you can use them like a printf debugging style kind of debugger.
  • @xmaple555 #4645 06:43 PM, 02 Sep 2023
    so do you suggest that only use LogInfo to debug while developing hyperdbgkd ?
  • @HughEverett ↶ Reply to #4645 #4646 06:46 PM, 02 Sep 2023
    I used to debug it like this up until now, and it perfectly works in all cases. There might be better innovative ways but right now, the best way that I'm known of is this.
  • @TheTrueIranicAryan #4647 07:48 PM, 02 Sep 2023
    Joined.
  • 03 September 2023 (68 messages)
  • @ricnar #4648 10:34 AM, 03 Sep 2023
    Compiled to try the dump option
  • @ricnar #4649 10:34 AM, 03 Sep 2023

    photo_2023-09-03_10-34-42.jpg
  • @ricnar ↶ Reply to #4507 #4650 11:13 AM, 03 Sep 2023
    can you explain the part event_inject
  • @ricnar #4651 11:13 AM, 03 Sep 2023
    i can guess the event part hyperdbg hooks the idt and catches the idt entrie
  • @ricnar #4652 11:13 AM, 03 Sep 2023
    in this case 3 of software interrupt
  • @ricnar #4653 11:13 AM, 03 Sep 2023
    and the part of the script?
  • @ricnar #4654 11:14 AM, 03 Sep 2023
    event_inject
  • @HughEverett ↶ Reply to #4650 #4655 11:22 AM, 03 Sep 2023
    I didn't get what you mean. 🤔
    Basically, we intercept interrupts by using the Exception Bitmap in VMCS in the target guest. And injecting event which is done by using the 'event_inject' function is also done by using hypervisor facilities.
  • @ricnar #4656 11:41 AM, 03 Sep 2023
    the dump is not well
  • @ricnar #4657 11:42 AM, 03 Sep 2023

    photo_2023-09-03_11-42-00.jpg
  • @ricnar #4658 11:42 AM, 03 Sep 2023
    i'm dumping from header and MZ not appear
  • @ricnar #4659 11:42 AM, 03 Sep 2023
    the dump is garbage
  • @ricnar #4660 11:42 AM, 03 Sep 2023
    i will retry
  • @HughEverett ↶ Reply to #4657 #4661 11:44 AM, 03 Sep 2023
    No, you're using '!dump', the '!dump' creates the dump from physical memory
  • @HughEverett #4662 11:44 AM, 03 Sep 2023
    not virtual memory
  • @HughEverett #4663 11:45 AM, 03 Sep 2023
    Use the '.dump' or the 'dump' which is for virtual memory.
  • @ricnar #4664 11:45 AM, 03 Sep 2023
    oh
  • @ricnar #4665 11:45 AM, 03 Sep 2023
    i see
  • @ricnar #4666 11:46 AM, 03 Sep 2023

    photo_2023-09-03_11-46-50.jpg
  • @ricnar #4667 11:47 AM, 03 Sep 2023
    ops the point
  • @HughEverett #4668 11:47 AM, 03 Sep 2023
    🤨🤨
  • @ricnar #4669 11:47 AM, 03 Sep 2023
    .dump
  • @ricnar #4670 11:47 AM, 03 Sep 2023
    sorry
  • @ricnar #4671 11:48 AM, 03 Sep 2023

    photo_2023-09-03_11-48-29.jpg
  • @ricnar #4672 11:50 AM, 03 Sep 2023

    photo_2023-09-03_11-50-23.jpg
  • @ricnar #4673 11:50 AM, 03 Sep 2023
    it works
  • @ricnar #4674 11:50 AM, 03 Sep 2023
    but works without the point too
  • @ricnar #4675 11:50 AM, 03 Sep 2023
    dump
  • @ricnar #4676 11:50 AM, 03 Sep 2023

    photo_2023-09-03_11-50-54.jpg
  • @ricnar #4677 11:51 AM, 03 Sep 2023

    photo_2023-09-03_11-51-08.jpg
  • @HughEverett ↶ Reply to #4674 #4678 11:52 AM, 03 Sep 2023
    yes, but all addresses should be available in the memory (not paged-out). (The exact limitation that we had, so we made the '.pagein' to solve it).
  • @ricnar #4679 12:23 PM, 03 Sep 2023
    the dump works but skips some not paged sections
  • @ricnar #4680 12:23 PM, 03 Sep 2023
    the err pages
  • @ricnar #4681 12:25 PM, 03 Sep 2023
    will be possible to make an script to page an entire range, maybe the script can page one by one pagein 1 , g page in 2 g tiil the entire range is completed but automatically
  • @HughEverett ↶ Reply to #4681 #4682 12:26 PM, 03 Sep 2023
    🤔
  • @HughEverett #4683 12:27 PM, 03 Sep 2023
    The problem here is, the 'CR2' for page-fault is only one register in Intel processors which mean we can only inject one page address for the page-fault.
  • @ricnar #4684 12:29 PM, 03 Sep 2023
    ina script
  • @ricnar #4685 12:29 PM, 03 Sep 2023
    you can make the complete process
  • @ricnar #4686 12:29 PM, 03 Sep 2023
    catch the fault, repeat etc
  • @ricnar #4687 12:29 PM, 03 Sep 2023
    one large script
  • @ricnar #4688 12:31 PM, 03 Sep 2023
    maybe
  • @HughEverett #4689 12:33 PM, 03 Sep 2023
    Yes, but it's a little bit complicated as in the current design the scripts are evaluated in the kernel-mode. Probably we need to re-write the script engine to support these kinds of scenarios.
  • @ricnar #4690 12:37 PM, 03 Sep 2023
    i see
  • @ricnar #4691 12:37 PM, 03 Sep 2023
    the dump command seems to work perfect
  • @ricnar #4692 12:38 PM, 03 Sep 2023
    thanks
  • @HughEverett #4693 01:19 PM, 03 Sep 2023

    photo_2023-09-03_13-19-33.jpg
  • @HughEverett #4694 01:19 PM, 03 Sep 2023

    photo_2023-09-03_13-19-34.jpg
  • @HughEverett #4695 01:19 PM, 03 Sep 2023

    photo_2023-09-03_13-19-34.jpg
  • @HughEverett ↶ Reply to #4693 #4696 01:20 PM, 03 Sep 2023
    @xmaple555 Here's the result. I couldn't reproduce the error that you mentioned.
  • @xmaple555 #4697 01:22 PM, 03 Sep 2023
    what will happen use t after eb ?
  • @HughEverett ↶ Reply to #4697 #4698 01:23 PM, 03 Sep 2023

    photo_2023-09-03_13-23-11.jpg
  • @xmaple555 ↶ Reply to #4698 #4699 01:54 PM, 03 Sep 2023
    I'll make an issue later . the sample I have problem is packed by themida
  • @HughEverett ↶ Reply to #4699 #4700 01:55 PM, 03 Sep 2023
    Okay 👍
  • @HughEverett #4701 04:31 PM, 03 Sep 2023
    @ricnar, one thing that I was thinking about it is why we need dumps from the PE modules? Is it because we want to reverse it based on extracted memory contents? or is it even possible to reconstruct the unpacked 'exe' file from this file? 🤔🧐
  • @ricnar #4702 04:32 PM, 03 Sep 2023
    Both
  • @ricnar #4703 04:32 PM, 03 Sep 2023
    To reverse with the dump of the code section will be enough
  • @ricnar #4704 04:33 PM, 03 Sep 2023
    To reconstruct we need to dump the complete image
  • @ricnar #4705 04:33 PM, 03 Sep 2023
    I try to reconstruct but the missing blocks affected the result
  • @ricnar #4706 04:34 PM, 03 Sep 2023
    And didn't work
  • @HughEverett #4707 04:34 PM, 03 Sep 2023
    How do you reconstruct? Is there any special method that I'm not known of?
  • @HughEverett ↶ Reply to #4705 #4708 04:34 PM, 03 Sep 2023
    I try to find a solution to fix it.
  • @ricnar #4709 04:34 PM, 03 Sep 2023
    Page in one by one all blocks is terrible
  • @ricnar #4710 04:36 PM, 03 Sep 2023
    Dumping with a user mode dumping tool works
  • @ricnar #4711 04:36 PM, 03 Sep 2023
    It can catch all the blocks
  • @HughEverett #4712 04:36 PM, 03 Sep 2023
    maybe we could write a custom assembly code that accesses the entire block, patch @RIP registers and once Windows brings the entire pages in the memory, we could use dump 🤔
  • @HughEverett ↶ Reply to #4710 #4713 04:36 PM, 03 Sep 2023
    Like what?
  • @ricnar #4714 04:37 PM, 03 Sep 2023
    Scylla reconstructor has a dump button
  • @ricnar #4715 04:38 PM, 03 Sep 2023
    I can dump with a ida script too
  • 04 September 2023 (8 messages)
  • @HughEverett #4716 12:22 PM, 04 Sep 2023
    🎉 Exciting news! The HyperDbg course is now available. 🚀

    This tutorial will guide you through the initial steps of using HyperDbg, covering essential concepts, principles, and debugging functionalities as well as numerous reverse engineering methods achievable by using HyperDbg, along with practical and real-world examples.

    Check it out here: 🔗 https://ost2.fyi/Dbg3301
    Debuggers 3301: HyperDbg

    This class teaches you how to use HyperDbg, a virtualization-based debugger.

  • @HughEverett ↶ Reply to #4716 #4717 12:25 PM, 04 Sep 2023
    It's a ~16 hours course which shows the potential of using HyperDbg for reverse engineering alongside a lot of cool hypervisor-based reverse engineering tricks.
  • @xmaple555 #4718 01:30 PM, 04 Sep 2023

    photo_2023-09-04_13-30-57.jpg
  • @xmaple555 #4719 01:34 PM, 04 Sep 2023
    hi, does anyone know how to show the message from LogInfo in hprdbgkd to the debuggee ? UseImmediateMessagingByDefaultOnEvents is true and the thread of ReadIrpBasedBuffer
    is running.
  • @HughEverett ↶ Reply to #4719 #4720 01:57 PM, 04 Sep 2023
    Hi,
    What do you mean? 🤨

    By default, once you connect HyperDbg to either the debugger mode or the VMI mode, the messages of LogInfo will be shown.
  • @HughEverett ↶ Reply to #4719 #4721 01:58 PM, 04 Sep 2023
    Like, you don't need to do anything for it, it shows the messages of this function automatically.
  • @xmaple555 ↶ Reply to #4721 #4722 02:10 PM, 04 Sep 2023
    my bad, I just realized that I always used the old sys file
  • @6216718224 #4723 07:15 PM, 04 Sep 2023
    Joined.
  • 06 September 2023 (1 messages)
  • @adgdsdagassgsndfdf #4724 10:08 AM, 06 Sep 2023
    Joined.
  • 07 September 2023 (12 messages)
  • @HughEverett ↶ Reply to #641 #4725 06:46 AM, 07 Sep 2023
    mkt The artifacts are now enabled in the 'dev' branch.

    photo_2023-09-07_06-46-02.jpg
  • @1376494095 #4726 11:41 AM, 07 Sep 2023
    @HughEverett Long time no see, can hyperdbg analyze vmprotect or themida, so as to deobfuscate and restore the original code.Very little information is available using vt-x analysis.
  • @invlpg #4727 11:42 AM, 07 Sep 2023
    deobfuscate and restore the original code? bro hyperdbg is a debugger, not the deobfuscator of any kind
  • @invlpg #4728 11:42 AM, 07 Sep 2023
    🤔
  • @invlpg #4729 11:42 AM, 07 Sep 2023
    it can help you with unpacking process though
  • @invlpg #4730 11:42 AM, 07 Sep 2023
    but not with any other kinds of obfuscation
  • @1376494095 #4731 11:43 AM, 07 Sep 2023
    What are the now latest anti-obfuscation techniques.
  • @1376494095 #4732 11:44 AM, 07 Sep 2023
    deobfuscation
  • @montagne1337 ↶ Reply to #4732 #4733 01:59 PM, 07 Sep 2023
    vtil if you want to devirtualize
  • @1376494095 #4734 02:14 PM, 07 Sep 2023
    Someone said on reddit that vtil has many shortcomings and cannot perfectly solve some deobfuscation problems.
  • @1376494095 #4735 10:03 PM, 07 Sep 2023
    So it also is the reason why the author chooses not to update.
  • @blackjustinFR #4736 10:15 PM, 07 Sep 2023
    hey with hyperdbg possible make read/write communication ?
  • 08 September 2023 (21 messages)
  • @HughEverett ↶ Reply to #4736 #4737 04:13 AM, 08 Sep 2023
    what kind of communication? network communication?
  • @Mengxin6668 #4739 07:09 AM, 08 Sep 2023
    Joined.
  • @invlpg ↶ Reply to #4737 #4740 07:11 AM, 08 Sep 2023
    He probably meant that he needs a virtual memory read/write primitives that he can call within the usermode part of his p2c
  • @invlpg #4741 07:11 AM, 08 Sep 2023
    animation.gif.mp4
  • @HughEverett ↶ Reply to #4740 #4742 07:31 AM, 08 Sep 2023
    BTW, whatever form he wants to communicate is possible. Either sharing a virtual memory (which can be done by using the '!monitor') or user/kernel communication (using the '!syscall'), PMIO or MMIO communication (using the '!ioin' and the '!ioout'), and even interrupt based communication using the '!interrupt'.
  • @HughEverett #4743 07:32 AM, 08 Sep 2023
    I just wanted to know the exact form to conduct him to the corresponding examples. 😅
  • @HughEverett ↶ Reply to #4741 #4744 07:32 AM, 08 Sep 2023
    IMG_9472.MOV
  • @1376494095 #4745 07:37 AM, 08 Sep 2023
    @HughEverett Is this possible for binary deobfuscator using hyperdbg? Or there is no idea.
  • @invlpg ↶ Reply to #4727 #4746 07:38 AM, 08 Sep 2023
    ^
  • @1376494095 #4747 07:39 AM, 08 Sep 2023
    Can it be used as a tracker?
  • @HughEverett ↶ Reply to #4745 #4748 07:41 AM, 08 Sep 2023
    As @invlpg mentioned, HyperDbg makes you able to debug. You might use HyperDbg's functionalities to perform your deobfuscation logic but it's not designed to directly deobfuscate anything.
  • @HughEverett ↶ Reply to #4747 #4749 07:41 AM, 08 Sep 2023
    If you mean tracker of (let say) memory, yes. It can be used for tracking it.
  • @1376494095 #4750 07:42 AM, 08 Sep 2023
    ☺️
  • @HughEverett ↶ Reply to #4749 #4751 07:43 AM, 08 Sep 2023
    But obviously, only tracking the memory is not enough for deobfuscating binaries 😵‍💫
  • @1376494095 #4753 07:46 AM, 08 Sep 2023
    If it is possible to record the instructions that are executing rip of the current process
  • @1376494095 ↶ Reply to #4751 #4754 07:48 AM, 08 Sep 2023
    i also need to what knowledge?
  • @1376494095 #4755 07:49 AM, 08 Sep 2023
    If can record each specified instruction, then it is feasible.
  • @HughEverett ↶ Reply to #4754 #4756 07:51 AM, 08 Sep 2023
    I don't have expertise in this area, maybe other members here can help.
  • @HughEverett ↶ Reply to #4755 #4757 07:52 AM, 08 Sep 2023
    You can record the instructions by using the "!monitor"'s 'x' attribute, but it's not practical (slow) if you want to do it for millions of instructions.
  • @1376494095 ↶ Reply to #4757 #4758 07:53 AM, 08 Sep 2023
    But it's fine. Thank you very much. ^ . ^
  • @dworakz #4759 12:44 PM, 08 Sep 2023
    Joined.
  • 09 September 2023 (16 messages)
  • @icmp8 #4760 12:55 AM, 09 Sep 2023
    Joined.
  • @ricnar #4761 09:55 AM, 09 Sep 2023
    good morning
  • @ricnar #4762 09:56 AM, 09 Sep 2023
    can you add to the code of dump command the address of the section failing when display the error?
  • @ricnar #4763 09:56 AM, 09 Sep 2023

    photo_2023-09-09_09-56-27.jpg
  • @ricnar #4764 09:57 AM, 09 Sep 2023
    if the address is displayed the section can be paged manually and can be dumped agin
  • @ricnar #4765 09:57 AM, 09 Sep 2023
    the errr can be like
  • @ricnar #4766 09:58 AM, 09 Sep 2023
    err, invalid address 0x41424344 by example
  • @ricnar #4767 09:58 AM, 09 Sep 2023
    this helps
  • @HughEverett ↶ Reply to #4762 #4768 10:04 AM, 09 Sep 2023
    Sure. I will add it tonight.
  • @ricnar #4769 10:40 AM, 09 Sep 2023
    thanks
  • @HughEverett ↶ Reply to #4762 #4770 01:18 PM, 09 Sep 2023
    Done! Please check the latest commit in the 'dev' branch.
  • @HughEverett #4771 01:18 PM, 09 Sep 2023

    photo_2023-09-09_13-18-53.jpg
  • @ricnar #4772 01:24 PM, 09 Sep 2023
    thanks
  • @HughEverett #4773 06:21 PM, 09 Sep 2023
    The documentation is updated and following functions are now added:

    - event_inject (https://docs.hyperdbg.org/commands/scripting-language/functions/events/event_inject)
    - event_inject_error_code (https://docs.hyperdbg.org/commands/scripting-language/functions/events/event_inject_error_code)

    and this the documentation for the '.dump' and the '!dump' commands:
    - .dump (https://docs.hyperdbg.org/commands/meta-commands/.dump)
    - !dump (https://docs.hyperdbg.org/commands/extension-commands/dump)

    cc @ricnar
    event_inject

    Description of 'event_inject' function in HyperDbg Scripts

  • @HughEverett #4774 06:21 PM, 09 Sep 2023
    and this is the document for the 'gu' command:
    https://docs.hyperdbg.org/commands/debugging-commands/gu

    cc @xmaple555
    gu (step-out or go up)

    Description of the 'gu' command in HyperDbg.

  • @ricnar #4775 06:23 PM, 09 Sep 2023
    Thanks
  • 10 September 2023 (1 messages)
  • @benz28_himself #4776 08:25 PM, 10 Sep 2023
    Joined.
  • 11 September 2023 (4 messages)
  • @nachoyawn #4777 03:23 AM, 11 Sep 2023
    Joined.
  • @LoveMinhal #4778 03:23 PM, 11 Sep 2023
    Joined.
  • @hiddencloud0 #4779 07:15 PM, 11 Sep 2023
    Joined.
  • @Ch1keen #4780 11:33 PM, 11 Sep 2023
    Joined.
  • 12 September 2023 (63 messages)
  • @1376494095 #4781 12:57 AM, 12 Sep 2023
    @HughEverett Hello, last week, I asked a question about deobfuscation in the group,One of my friends in the group answered my question and gave his solution, also using vt-x technology for de-obfuscation. Later I saw his open source project and gave his advice.All the debuggers on the market today (e.g. ida pro x64dbg, etc.) have sdk capabilities. I think hyperdbg should also have sdk capabilities.It is more convenient for them to prevent repeated manufacturing of wheels.Similar projects cannot be compared to hyperdbg because hyperdbg is superior.
  • @HughEverett ↶ Reply to #4781 #4782 02:52 AM, 12 Sep 2023
    HyperDbg already has a SDK (from v0.2).
    Here is a link to examples:
    https://github.com/HyperDbg/HyperDbg/tree/rev-machine/hyperdbg/include/SDK/Examples
    HyperDbg/hyperdbg/include/SDK/Examples at rev-machine · HyperDbg/HyperDbg

    State-of-the-art native debugging tool. Contribute to HyperDbg/HyperDbg development by creating an account on GitHub.

  • @HughEverett ↶ Reply to #4782 #4783 02:53 AM, 12 Sep 2023
    It's not yet well-documented but as it's open-source, it's easy to understand.
  • @HughEverett #4784 02:54 AM, 12 Sep 2023
    I try to document everything once I find free time.
  • @1376494095 ↶ Reply to #4784 #4785 02:56 AM, 12 Sep 2023
    Thank you, today I find a warehouse, https://github.com/tklengyel/drakvuf, look at their ideas very well, can draw lessons from?
    GitHub - tklengyel/drakvuf: DRAKVUF Black-box Binary Analysis

    DRAKVUF Black-box Binary Analysis. Contribute to tklengyel/drakvuf development by creating an account on GitHub.

  • @1376494095 #4786 02:57 AM, 12 Sep 2023
    They have a video demo on their website that you can check out
  • @HughEverett ↶ Reply to #4785 #4787 04:16 AM, 12 Sep 2023
    Yes, drakvuf is great project. There are so many cool ideas we'd love to bring to life with HyperDbg. The only catch is that we're a bit short on time and developers. We're really hoping to see more folks from the community jump in and help us design and implement these features for HyperDbg.
  • @1376494095 ↶ Reply to #4787 #4788 04:28 AM, 12 Sep 2023
    If the project is perfect and meets the needs of the majority of developers, some people will not reinvent the wheel, and the project will be kept active and more people will be involved.
  • @5539033269 #4789 04:35 AM, 12 Sep 2023
    bro sina is currently one man army, he’s doing his higher education while developing hyperdbg and some other projects. So show some respect. He wants to make it perfect, he just doesn’t have the time, he works until 4,5 am each day as I know
  • @1376494095 ↶ Reply to #4787 #4790 09:06 AM, 12 Sep 2023
    I have a look and it doesn't seem possible to add this project to hyperdbg because they are using open source projects xen and qemu which don't follow the same principles as hyperdbg implementation.hyperdbg is placed in the guest system, drakvuf is outside the guest system, and drakvuf has higher concealment for malicious programs.So, the idea is right for hyperdbg, but the hyperdbg implementation is wrong.
  • @1376494095 ↶ Reply to #4787 #4791 09:14 AM, 12 Sep 2023
    Therefore, in order to avoid overworking yourself, we should think about how we can reduce the task and make the project better.
  • @1376494095 #4792 09:32 AM, 12 Sep 2023
    And staying up late for a long time is not good for your body, the symptoms will have spleen and stomach disorders, hypertension and other symptoms. So you need to pay attention.
  • @HughEverett ↶ Reply to #4792 #4793 09:34 AM, 12 Sep 2023
    Yeah no worries, Tony is a little bit exaggerating 😅
  • @HughEverett #4794 09:35 AM, 12 Sep 2023
    Of course there are plenty of people here helping in the development of HyperDbg, I'm not the only developer.
  • @HughEverett #4795 09:36 AM, 12 Sep 2023
    But sure, new developers are always welcome to join.
  • @1376494095 #4796 09:36 AM, 12 Sep 2023
    These are chronic diseases, long-term will indeed have an impact on the body, look at their tongue, tongue coating white is sick, on the contrary, the body is healthy
  • @1376494095 #4797 09:40 AM, 12 Sep 2023
    I didn't mean anything other than to make the project better, and I've committed code before. Are there any good ideas to change that.
  • @HughEverett ↶ Reply to #4797 #4798 09:44 AM, 12 Sep 2023
    Do you need some ideas to implement in HyperDbg?
  • @1376494095 #4799 09:45 AM, 12 Sep 2023
    Yes, but not at the moment
  • @1376494095 #4800 09:45 AM, 12 Sep 2023
    I didn't come up with good ideas
  • @HughEverett #4801 09:54 AM, 12 Sep 2023
    There are plenty of ideas.
    But, one of the things that are really needed right now is supporting 'kdnet'. The source code for 'kdnet' is available in Windows SDK and the license allows us to use it. Maybe if you can take a look at it and use it on a sample project and send/receive data using it, we could add it to HyperDbg. This will be a huge contribution at the moment.
  • @1376494095 #4802 09:57 AM, 12 Sep 2023
    I need to complete my deobfuscation task, but this is also a big pit.
  • @1376494095 ↶ Reply to #4801 #4803 10:04 AM, 12 Sep 2023
    From my point of view, I need some time to complete this task, I really sorry about hyperdbg.
  • @1376494095 #4804 10:08 AM, 12 Sep 2023
    At some point I will think about how to incorporate qemu functionality into hyperdbg, current I have no good idea.
  • @HughEverett ↶ Reply to #4804 #4805 10:09 AM, 12 Sep 2023
    This one is also a nice idea. Using qemu or any other emulator we could enhance HyperDbg core.
  • @1376494095 #4806 10:10 AM, 12 Sep 2023
    yeah
  • @1376494095 #4807 10:12 AM, 12 Sep 2023
    If hyperdbg can replace xen hypervisor, I believe we can.
  • @HughEverett #4808 10:12 AM, 12 Sep 2023
    For example, the current implementation of the '!monitor' command uses Monitor Trap Flag (MTF) to restore the state to the previous state. If we have an emulator there we could eliminate the MTF and by this we can gain 2x speed up as we only one VM-exit happens and the second VM-exit is eliminated.
  • @1376494095 #4809 10:14 AM, 12 Sep 2023
    I think we should think about it carefully.
  • @1376494095 #4810 10:14 AM, 12 Sep 2023
    It also brings in more developers.
  • @HughEverett ↶ Reply to #4809 #4811 10:15 AM, 12 Sep 2023
    yeah, in case of the emulator it should be VMX-mode Compatible (or simply written in C) without any special API call or weird memory allocations.
  • @1376494095 #4812 10:18 AM, 12 Sep 2023
    The key point is how can qemu be combined with hyperdbg to make both of them more useful.
  • @1376494095 #4813 10:19 AM, 12 Sep 2023
    Some concepts seem to be different between qemu and vt-x
  • @HughEverett ↶ Reply to #4813 #4814 10:23 AM, 12 Sep 2023
    Yeah, I see some of the code in KVM that uses Qemu-based emulators to enhance and accelerate the execution IOMMU instructions.

    https://android.googlesource.com/kernel/msm/+/android-wear-5.1.1_r0.6/arch/x86/kvm/emulate.c?autodive=0%2F%2F%2F%2F%2F%2F%2F%2F%2F#4567
  • @1376494095 #4815 10:32 AM, 12 Sep 2023
    So, do you have any good ideas for hyperdbg and qemu?
  • @HughEverett ↶ Reply to #4815 #4816 10:33 AM, 12 Sep 2023
    Yes, as I said we can enhance many feature if we have the capability of emulating instruction in VMX-root mode.
  • @HughEverett ↶ Reply to #4808 #4817 10:33 AM, 12 Sep 2023
    One improvement idea would be this.
  • @HughEverett #4818 10:34 AM, 12 Sep 2023
    It also makes us able to do a lot of other improvements in PMIO and MMIO emulations making endless possibilities.
  • @1376494095 #4819 10:38 AM, 12 Sep 2023
    qemu might not be very compatible with windows,What I mean is that if you change either side, it will affect the code, and if great modification hyperdbg, it will require your consent.
  • @1376494095 #4820 10:41 AM, 12 Sep 2023
    intel/haxm is required to run qemu on windows.
  • @HughEverett ↶ Reply to #4819 #4821 10:42 AM, 12 Sep 2023
    I think what we need right now is the codes of qemu that perform emulation for certain instructions. Maybe the bochs project can help us too.

    https://github.com/bochs-emu/Bochs

    The way that they used Qemu in KVM is for implementing certain Intel instructions in C. It doesn't need to be compatible with Windows, we only need their Instructions implementations which is an Intel (more specifically x86) dependent.
    GitHub - bochs-emu/Bochs: Bochs - Cross Platform x86 Emulator Project

    Bochs - Cross Platform x86 Emulator Project. Contribute to bochs-emu/Bochs development by creating an account on GitHub.

  • @HughEverett ↶ Reply to #4821 #4822 10:43 AM, 12 Sep 2023
    This is the way that I can think of using Qemu in HyperDbg. Maybe other usages can be also applied that I'm not yet known of.
  • @HughEverett ↶ Reply to #4814 #4823 10:44 AM, 12 Sep 2023
    KVM is truly a masterpiece. 👌
  • @1376494095 ↶ Reply to #4823 #4824 10:50 AM, 12 Sep 2023
    Yes,kvm is more mature, now it is mainly to understand the project structure of qemu,kvm or xen and drakvuf, analyze the code. How to do the docking is more appropriate
  • @1376494095 #4825 10:53 AM, 12 Sep 2023
    Less important features for now, can we put them on hold.
  • @1376494095 #4826 10:56 AM, 12 Sep 2023
    For vt-x, some programs do have the ability to check that vt-x is on, so we're going to avoid those.
  • @HughEverett ↶ Reply to #4826 #4827 10:57 AM, 12 Sep 2023
    you mean anti-hypervisor methods?
  • @1376494095 ↶ Reply to #4827 #4828 10:59 AM, 12 Sep 2023
    I mean for example drakvuf with the idea that any program should not detect anomalous vt-x drivers
  • @HughEverett ↶ Reply to #4828 #4829 11:01 AM, 12 Sep 2023
    yes, we also made some efforts for hiding HyperDbg but sure that's not enough. You can read about some of them here: https://research.hyperdbg.org/debugger/transparency.html
  • @1376494095 #4830 11:02 AM, 12 Sep 2023
    Even if turned on,They can't be hidden. Some detect these
  • @HughEverett ↶ Reply to #4830 #4831 11:03 AM, 12 Sep 2023
    Yes, there are plenty of ways that reveal the presence of a hypervisor.
  • @HughEverett #4832 11:03 AM, 12 Sep 2023
    But most of them can be mitigated in HyperDbg.
  • @HughEverett #4833 11:04 AM, 12 Sep 2023
    Which would be an enhancement for the future versions.
  • @HughEverett ↶ Reply to #4834 #4835 11:08 AM, 12 Sep 2023
    like how? 🤔
  • @1376494095 #4836 11:09 AM, 12 Sep 2023
    I think hiding works better if you handle this at the qemu level, not at the guest os, which is why the reverse engineer uses qemu.
  • @HughEverett ↶ Reply to #4836 #4837 11:11 AM, 12 Sep 2023
    I don't have any idea how handling things in qemu-level can be helpful mitigating these caveats. Do you know any special use case for it? 🤔
  • @1376494095 #4838 11:11 AM, 12 Sep 2023
    Because if a driver is loaded inside the system, it is already exposed, and a malicious program can always obtain the program in various ways to reverse analyze it anyway.
  • @HughEverett ↶ Reply to #4838 #4839 11:13 AM, 12 Sep 2023
    I think the solution to these kind of problems is better to be handled at EPT-level leveraging a Type1-like hypervisor memory in which the VMM codes (drivers) are hidden behind the EPT.
  • @1376494095 #4840 11:14 AM, 12 Sep 2023
    Yes, but in some developing countries, r3 can also detect r-1.
  • @HughEverett ↶ Reply to #4840 #4842 11:16 AM, 12 Sep 2023
    Yes, but detecting a hypervisor is not a big deal these days. Mainly because Hyper-V's VBS and HVCI are now enabled by default in Win 11.
  • @1376494095 #4843 11:17 AM, 12 Sep 2023
    What you said is only a small part, for other malicious programs, when detected, the consequences can be imagined.
  • @1376494095 #4844 11:19 AM, 12 Sep 2023
    This is where projects like drakvuf cause for emergence.
  • @zerostepo #4845 08:55 PM, 12 Sep 2023
    Joined.
  • 13 September 2023 (1 messages)
  • @m_mahdi_ahmadi #4846 08:41 AM, 13 Sep 2023
    Joined.
  • 14 September 2023 (5 messages)
  • @1875005376 #4847 09:16 AM, 14 Sep 2023
    Hi,I have a question about VPID and TLB. When VPID is enabled, when there is an instruction to modify cr3, we manually flush guest TLB entries in the HvHandleControlRegisterAccess function. But by default we do not intercept access to cr3 because of IA32_VMX_BASIC. Does this mean that a Mov to CR3 instruction will automatically flush the TLB, but when we intercept an instruction to modify cr3, we put cr3 into VMCS and then execute VMRESUME, which will not automatically flush the TLB and we must manually execute INVVPID to flush TLB?
  • @HughEverett ↶ Reply to #4847 #4848 09:28 AM, 14 Sep 2023
    Hi,
    Yes, you're right. By default MOV to CR3 flushes the TLB but once you activate VPIDs, you have to manually invalidate it.
  • @1875005376 #4849 09:30 AM, 14 Sep 2023
    ok thanks
  • @FarmEquipment999 #4850 06:51 PM, 14 Sep 2023
    Joined.
  • @5781093824 #4851 09:30 PM, 14 Sep 2023
    @Sina (don't want to actually tag u) i love you, thanks for this amazing project.
  • 15 September 2023 (5 messages)
  • @HughEverett ↶ Reply to #4851 #4853 02:14 AM, 15 Sep 2023
    IMG_9472.MOV
  • @HughEverett ↶ Reply to #4851 #4854 02:14 AM, 15 Sep 2023
    Thank you ☺️
    As I said before, it's not just me, plenty of my friends and community members helped in this project.
  • @HughEverett #4855 04:20 PM, 15 Sep 2023
    @ricnar
    My friend @mammadataei is redesigning the website of HyperDbg. Are you okay that he put a link (a reference) to your videos on the main website?

    It would be like this:

    https://hyperdbg-48pxfwan3-hyperdbg.vercel.app/tutorials
  • @ricnar #4856 06:01 PM, 15 Sep 2023
    no problem
  • @ricnar #4857 06:01 PM, 15 Sep 2023
    thanks
  • 16 September 2023 (9 messages)
  • @HughEverett #4858 09:57 AM, 16 Sep 2023
    image_2023-09-16_18-24-05.png
  • @HughEverett #4859 09:57 AM, 16 Sep 2023

    photo_2023-09-16_09-57-48.jpg
  • @HughEverett #4860 10:01 AM, 16 Sep 2023
    @xmaple555
    We automatically change the grammar file (for adding "strcmp").

    First, you should add the function into this file:
    https://github.com/HyperDbg/HyperDbg/blob/master/hyperdbg/script-engine/python/Grammar.txt

    And after that, you should run this python script:
    https://github.com/HyperDbg/HyperDbg/blob/master/hyperdbg/script-engine/python/generator.py

    It will automatically create the constant values needed for the script engine.

    BTW, I fixed it now, and pushed it into the 'dev' branch but please consider this for the future. 🙏
    HyperDbg/hyperdbg/script-engine/python/Grammar.txt at master · HyperDbg/HyperDbg

    State-of-the-art native debugging tool. Contribute to HyperDbg/HyperDbg development by creating an account on GitHub.

  • @HughEverett #4861 10:04 AM, 16 Sep 2023
    Now, that you added this function, once you have free time, please add the "wcscmp" too. As most of the strings in the Windows kernel are in wide char string format, it would be best if HyperDbg supported it too. @xmaple555
  • @HughEverett ↶ Reply to #4861 #4862 10:33 AM, 16 Sep 2023
    and even the 'memcmp' and other possible cstring functions might be helpful as well.

    https://cplusplus.com/reference/cstring/memcmp/
  • @xmaple555 ↶ Reply to #4860 #4863 10:42 AM, 16 Sep 2023
    thank for the information, I will consider it next time
  • @apkunpacker ↶ Reply to #4862 #4864 10:47 AM, 16 Sep 2023
    Hy , i was running codespell on hyperdbg source and got tons of typo , will you accept such pr's to correct them?
  • @HughEverett ↶ Reply to #4864 #4865 10:48 AM, 16 Sep 2023
    Sure. It would be best if you can push it into the 'dev' branch (not 'master' branch) to avoid possible git conflicts. 🙏
  • @haxxius #4866 12:42 PM, 16 Sep 2023
    Joined.
  • 19 September 2023 (44 messages)
  • @xmaple555 #4867 02:21 AM, 19 Sep 2023

    photo_2023-09-19_02-21-08.jpg
  • @xmaple555 #4868 02:21 AM, 19 Sep 2023
    I got the problem since the commit https://github.com/HyperDbg/HyperDbg/commit/bab42a6623fa6370c0449dad89d2888c74da059d
    fix conflicts of rev branch · HyperDbg/HyperDbg@bab42a6

    State-of-the-art native debugging tool. Contribute to HyperDbg/HyperDbg development by creating an account on GitHub.

  • @HughEverett ↶ Reply to #4868 #4869 02:24 AM, 19 Sep 2023
    Are "hprdbghv.sys" and "hprdbgkd.sys" correctly build?
  • @HughEverett ↶ Reply to #4868 #4870 02:24 AM, 19 Sep 2023
    Can 'git pull' to the latest commit in the 'dev' branch?
  • @xmaple555 #4871 02:25 AM, 19 Sep 2023
    this is the latest dev.
  • @HughEverett ↶ Reply to #4869 #4872 02:26 AM, 19 Sep 2023
    ؟
  • @HughEverett #4873 02:26 AM, 19 Sep 2023
    Are these files there?
  • @xmaple555 #4874 02:26 AM, 19 Sep 2023
    yes
  • @HughEverett #4875 02:27 AM, 19 Sep 2023
    🤨🤔
  • @HughEverett #4876 02:27 AM, 19 Sep 2023
    0x7f error is for this

    photo_2023-09-19_02-27-46.jpg
  • @xmaple555 ↶ Reply to #4867 #4877 02:27 AM, 19 Sep 2023
    this failed to start the service hprdbgkd
  • @HughEverett #4878 02:28 AM, 19 Sep 2023
    Doesn't make sense, I didn't do anything special since the previous commit.
  • @xmaple555 #4879 02:28 AM, 19 Sep 2023
    yes I know the error, and I have tried to google it
  • @xmaple555 #4880 02:29 AM, 19 Sep 2023

    photo_2023-09-19_02-29-07.jpg
  • @xmaple555 #4881 02:29 AM, 19 Sep 2023
    I guess the problem is from the two commits
  • @HughEverett ↶ Reply to #4881 #4882 02:30 AM, 19 Sep 2023
    I don't think so, because the later commits fixed these problems
  • @HughEverett #4883 02:30 AM, 19 Sep 2023

    photo_2023-09-19_02-30-23.jpg
  • @HughEverett #4884 02:31 AM, 19 Sep 2023
    I suspect maybe you previously loaded a driver which is not yet unloaded correctly
  • @HughEverett #4885 02:31 AM, 19 Sep 2023
    and that might be problematic? Did you load anything manually? like using OSR Driver Loader?
  • @HughEverett #4886 02:31 AM, 19 Sep 2023
    🤔
  • @xmaple555 ↶ Reply to #4882 #4887 02:40 AM, 19 Sep 2023
    but It works fine for me on the commit add strcmp into the grammar file
  • @HughEverett ↶ Reply to #4887 #4888 02:42 AM, 19 Sep 2023
    I am in the latest 'dev' branch.

    photo_2023-09-19_02-42-57.jpg
  • @HughEverett ↶ Reply to #4887 #4889 02:43 AM, 19 Sep 2023
    Can you remove your local files and clone the project again?
  • @xmaple555 #4890 02:43 AM, 19 Sep 2023
    I have tried it
  • @HughEverett #4891 02:44 AM, 19 Sep 2023
    It's weird. 🧐🤔
  • @HughEverett #4892 02:44 AM, 19 Sep 2023
    Let me try github artifacts: https://github.com/HyperDbg/HyperDbg/actions/runs/6221482653
    add mode command · HyperDbg/HyperDbg@78ca118

    State-of-the-art native debugging tool. Contribute to HyperDbg/HyperDbg development by creating an account on GitHub.

  • @xmaple555 #4893 02:45 AM, 19 Sep 2023
    maybe hyperdbg.sln changed ?
  • @HughEverett ↶ Reply to #4892 #4894 02:46 AM, 19 Sep 2023
    GitHub artifact works fine.

    photo_2023-09-19_02-46-14.jpg
  • @HughEverett ↶ Reply to #4893 #4895 02:47 AM, 19 Sep 2023
    It might be changed by file changes but I didn't change anything special since that commit.
  • @HughEverett #4896 02:47 AM, 19 Sep 2023
    And if you got the latest commit, it should be fine.
  • @xmaple555 #4897 02:49 AM, 19 Sep 2023

    photo_2023-09-19_02-49-30.jpg
  • @xmaple555 #4898 02:50 AM, 19 Sep 2023
    maybe the differential OS ?
  • @HughEverett ↶ Reply to #4898 #4899 02:50 AM, 19 Sep 2023
    I don't think so. Let me check it on Win 10.
  • @xmaple555 #4900 02:51 AM, 19 Sep 2023

    photo_2023-09-19_02-51-32.jpg
  • @HughEverett ↶ Reply to #4900 #4901 02:56 AM, 19 Sep 2023
    Did you get the same error on both the "debug" and the "release" version?
  • @xmaple555 ↶ Reply to #4901 #4902 02:58 AM, 19 Sep 2023

    photo_2023-09-19_02-58-12.jpg
  • @xmaple555 #4903 02:58 AM, 19 Sep 2023
    yes
  • @HughEverett ↶ Reply to #4902 #4904 05:43 AM, 19 Sep 2023
    @xmaple555 I test it on a Win 10 VM and it worked perfectly fine. Are you sure that you didn't made any special changes in your VM? (e.g., like disabling Nested-virtualization)
  • @HughEverett #4905 05:44 AM, 19 Sep 2023
    Can you also test it with github-built artifacts?
    https://github.com/HyperDbg/HyperDbg/actions/runs/6221482653
    add mode command · HyperDbg/HyperDbg@78ca118

    State-of-the-art native debugging tool. Contribute to HyperDbg/HyperDbg development by creating an account on GitHub.

  • @1314174729 #4906 09:57 AM, 19 Sep 2023
    Joined.
  • @1376494095 #4907 10:34 AM, 19 Sep 2023
    it looks like you didn't turn off driver signature verification or The hyperdbg project was not compiled correctly.
  • @xmaple555 #4908 02:56 PM, 19 Sep 2023
    @HughEverett it works fine on WIN 11
  • @xmaple555 #4909 02:57 PM, 19 Sep 2023
    not really sure what I had done on WIN 10 🤔
  • @xmaple555 #4910 03:08 PM, 19 Sep 2023

    photo_2023-09-19_15-08-08.jpg
  • 20 September 2023 (2 messages)
  • @Secret00Sec #4911 10:09 AM, 20 Sep 2023
    Joined.
  • @exmazafaka #4912 06:44 PM, 20 Sep 2023
    Joined.
  • 22 September 2023 (1 messages)
  • @zheekfl #4913 07:10 AM, 22 Sep 2023
    Joined.
  • 23 September 2023 (6 messages)
  • @Secret00Sec #4914 09:11 AM, 23 Sep 2023
    salty-attitude.mp4
  • @sariaki #4915 04:22 PM, 23 Sep 2023
    Yo, is it by chance possible to view memory access rights in hyperdbg?
  • @HughEverett ↶ Reply to #4915 #4916 04:24 PM, 23 Sep 2023
    Do you mean the page-table attributes?
  • @sariaki ↶ Reply to #4916 #4917 04:33 PM, 23 Sep 2023
    yes
  • @HughEverett ↶ Reply to #4917 #4918 05:00 PM, 23 Sep 2023
    You can use the '!pte' command:

    https://docs.hyperdbg.org/commands/extension-commands/pte
    !pte (display page-level address and entries)

    Description of the '!pte' command in HyperDbg.

  • @sariaki ↶ Reply to #4918 #4919 05:06 PM, 23 Sep 2023
    ah i remember this command.
    i'm just now seeing that it also gives you the attributes. thanks!
  • 24 September 2023 (17 messages)
  • @5778716172 #4920 12:34 AM, 24 Sep 2023
    Joined.
  • @1376494095 #4921 01:01 AM, 24 Sep 2023
    @HughEverett Observing drakvuf for a few days found that the idea is very good, but the underlying infrastructure is very bad, not recommended to use, or concentrate on vt-x related projects
  • @1376494095 #4922 01:04 AM, 24 Sep 2023
    For malicious programs to find vt-x drivers, it should be possible to find the key points through static or dynamic combination.
  • @vmescaper #4923 01:57 AM, 24 Sep 2023
    Joined.
  • @HughEverett ↶ Reply to #4921 #4924 04:23 AM, 24 Sep 2023
    What else do you suggest other than vt-x? Direct hooking?
  • @1376494095 #4925 04:25 AM, 24 Sep 2023
    At present, direct hook, there is not much manpower and material resources to repair.
  • @1376494095 #4926 04:30 AM, 24 Sep 2023
    The vt-x seems like a time - and labor-saving solution,However, they have all the versions fixed and it is difficult to update iterations,They try to keep the same version, so it's hard to iterate,
  • @1376494095 #4927 04:32 AM, 24 Sep 2023
    The underlying libvmi is very low active and poorly compatible
  • @1376494095 #4928 04:35 AM, 24 Sep 2023
    For now, the best practice is to do static analysis first and then hook with vt-x
  • @1875005376 #4929 09:32 AM, 24 Sep 2023
    @HughEverett Hi,I noticed that the implementation principle of !epthook is to allocate a new page, then unsets the Read and Write bits of that page but sets the Execute bit, and change the physical address of that entry to the new location.Then if someone tries to Read or Write on that virtual address, we bring the original physical address back to the page entry and set both Read and Write bits of that page but unset the Execute bit.
    But when the page we want to hook has an instruction to read its own page, For example, mov rcx, [rip], can !epthook work well?
  • @HughEverett ↶ Reply to #4929 #4930 09:42 AM, 24 Sep 2023
    Hi,
    Nice catch. I never thought about it though it never happens to HyperDbg as this sentence doesn't imply how !epthook is implemented. I mean this sentence:

    > we bring the original physical address back to the page entry and set both Read and Write bits of that page but unset the Execute bit.

    The entry that will be restored has the full permission (Read/Write/Exec) + plus we set MTF to restore everything after executing one instruction.
  • @1875005376 ↶ Reply to #4930 #4931 09:59 AM, 24 Sep 2023
    Yes, I noticed that the entry that will be restored to OriginalEntry, and OriginalEntry has full permissions, which solves the problem of the instruction reading itself. But it seems to introduce another problem. We give a page complete permissions, and then we set MTF to execute one instruction in this Core. However, because all Cores use the same EptPageTable, another Core may execute in the page without hook at this time.
  • @HughEverett ↶ Reply to #4931 #4932 12:14 PM, 24 Sep 2023
    This problem is also solved. 🙂
  • @HughEverett #4933 12:14 PM, 24 Sep 2023
    Each core uses its own EPTP instead of a single memory layout design.
  • @HughEverett #4934 12:14 PM, 24 Sep 2023
    Check the latest commits in the 'dev' branch.
  • @1875005376 ↶ Reply to #4933 #4935 12:30 PM, 24 Sep 2023
    That's great
  • @amdghazi #4936 01:06 PM, 24 Sep 2023
    Joined.
  • 25 September 2023 (3 messages)
  • @6388476678 #4937 01:57 AM, 25 Sep 2023
    Joined.
  • @losenine #4938 04:09 AM, 25 Sep 2023
    Joined.
  • @HughEverett #4939 04:42 AM, 25 Sep 2023
    HyperDbg v0.6-beta is released!

    Check out: https://github.com/HyperDbg/HyperDbg/releases/tag/v0.6.0-beta

    HyperDbg's memory model has undergone a significant change, transitioning to a multiple-EPTP model. This change has effectively resolved potential raised conditions. Because this was a fundamental design change, we decided to release a 'beta' version, which is mainly released for testing purposes, if you've ever occurred to have an error, please report it on GitHub issues.

    Added
    event_inject(InterruptionType, Vector) function in script engine
    event_inject_error_code(InterruptionType, Vector, ErrorCode) function in script engine
    .dump - command is added to the debugger to dump the virtual memory into a file
    !dump - command is added to the debugger to dump the physical memory into a file
    gu - command is added to the debugger to step-out or go up instructions thanks to @xmaple555

    Changed
    HyperDbg now switched to a multiple EPTP memory model, and each core has its own EPT table
    Building mtrr map by adding smrr, fixed ranges, and default memory type is fixed (#255) thanks to @Air14
    The problem of removing multiple EPT hooks on a single address is fixed
    The problem of not intercepting the step-over command 'p' when executed in different cores is fixed
    HyperDbg now checks for the validity of physical addresses based on CPUID.80000008H:EAX[7:0]'s physical address width
    Release v0.6.0-beta · HyperDbg/HyperDbg

    HyperDbg v0.6-beta is released! If you’re enjoying HyperDbg, don’t forget to give a star 🌟 on GitHub! Please visit Build & Install to configure the environment for running HyperDbg. Check out t...

  • 27 September 2023 (1 messages)
  • @Baoxam #4950 10:59 PM, 27 Sep 2023
    Joined.
  • 28 September 2023 (7 messages)
  • @Lazarus2024 #4951 10:37 AM, 28 Sep 2023
    Joined.
  • @Lazarus2024 #4952 10:37 AM, 28 Sep 2023
    hi everybody,how to use it with x64dbg?
  • @HughEverett ↶ Reply to #4952 #4953 11:31 AM, 28 Sep 2023
    Hi,
    The full support of x64dbg (and possibly other debuggers) is not yet added to the HyperDbg, though it's on top of the to-do list and will be added hopefully in v0.7 or v0.8 but right now you can use some feature and it more or less make it possible to support other debuggers, e.g., by default HyperDbg intercepts all breakpoints as it's a hypervisor-level debugger, thus, other debuggers won't get a chance to handle the breakpoints but using the 'test breakpoint off' you can tell HyperDbg not to handle breakpoints and re-inject #BPs to the Windows (and thus x64dbg).

    https://docs.hyperdbg.org/commands/debugging-commands/test#parameters
    test (test functionalities)

    Description of the 'test' command in HyperDbg.

  • @HughEverett #4954 11:34 AM, 28 Sep 2023
    Other than that, HyperDbg v0.6 supports event (interrupts/exceptions/faults) injection which brings thousands of possible scenarios in which you can pass or not pass events to the kernel-mode or user-mode debugger. But it's a little bit tricky to use.

    Please check,
    https://docs.hyperdbg.org/commands/scripting-language/functions/events/event_inject
    event_inject

    Description of 'event_inject' function in HyperDbg Scripts

  • @Lazarus2024 #4955 11:34 AM, 28 Sep 2023
    If you need help, I can help you for free. I hope that the dbg plug-in will appear soon.
  • @HughEverett ↶ Reply to #4955 #4956 11:40 AM, 28 Sep 2023
    Do you want to help in adding the support to x64dbg? or generally helping in the development?
  • @HughEverett #4957 11:47 AM, 28 Sep 2023
    I think I have to add support for x64dbg myself because it's likely a one-minute task to re-inject #DBs (along with #BPs) into the user-mode or kernel-mode debugger. However, the challenge is that it may potentially disrupt other features of HyperDbg that rely on these events. Therefore, I need to have a comprehensive test to ensure that passing #DBs to the guest doesn't break anything. For example, commands like !epthook also utilize #BPs. If we re-inject everything without considering these internal usages, we might break other HyperDbg commands.
  • 29 September 2023 (2 messages)
  • @Secret00Sec #4958 02:11 PM, 29 Sep 2023
    new bee
  • @Secret00Sec #4959 02:12 PM, 29 Sep 2023
    hyperdbg yyds
  • 30 September 2023 (4 messages)
  • @Disavowed #4961 04:09 AM, 30 Sep 2023
    Joined.
  • @eVaanar #4962 08:34 AM, 30 Sep 2023
    Joined.
  • @899445248 #4963 03:53 PM, 30 Sep 2023
    Joined.
  • @agitoreiken #4964 09:36 PM, 30 Sep 2023
    Joined.
  • 01 Sep 2023 (4)
  • 02 Sep 2023 (10)
  • 03 Sep 2023 (68)
  • 04 Sep 2023 (8)
  • 06 Sep 2023 (1)
  • 07 Sep 2023 (12)
  • 08 Sep 2023 (21)
  • 09 Sep 2023 (16)
  • 10 Sep 2023 (1)
  • 11 Sep 2023 (4)
  • 12 Sep 2023 (63)
  • 13 Sep 2023 (1)
  • 14 Sep 2023 (5)
  • 15 Sep 2023 (5)
  • 16 Sep 2023 (9)
  • 19 Sep 2023 (44)
  • 20 Sep 2023 (2)
  • 22 Sep 2023 (1)
  • 23 Sep 2023 (6)
  • 24 Sep 2023 (17)
  • 25 Sep 2023 (3)
  • 27 Sep 2023 (1)
  • 28 Sep 2023 (7)
  • 29 Sep 2023 (2)
  • 30 Sep 2023 (4)