@hyperdbg

@hyperdbg / Public archive of HyperDbg Telegram messages.

  • 2025

    • May 2025 (97)
    • Apr 2025 (303)
    • Mar 2025 (443)
    • Feb 2025 (220)
    • Jan 2025 (167)
  • 2024

    • Dec 2024 (72)
    • Nov 2024 (235)
    • Oct 2024 (83)
    • Sep 2024 (263)
    • Aug 2024 (332)
    • Jul 2024 (403)
    • Jun 2024 (570)
    • May 2024 (245)
    • Apr 2024 (156)
    • Mar 2024 (90)
    • Feb 2024 (134)
    • Jan 2024 (309)
  • 2023

    • Dec 2023 (62)
    • Nov 2023 (326)
    • Oct 2023 (76)
    • Sep 2023 (315)
    • Aug 2023 (757)
    • Jul 2023 (2215)
    • Jun 2023 (778)
    • May 2023 (300)
    • Apr 2023 (1)
    • Feb 2023 (5)
    • Jan 2023 (1)
  • 2022

    • Nov 2022 (1)
    • Oct 2022 (2)
    • Sep 2022 (1)
    • Aug 2022 (1)
    • Jul 2022 (39)
    • Jun 2022 (23)
    • May 2022 (256)
  • 2021

    • Dec 2021 (1)
    • Oct 2021 (82)
    • Jun 2021 (1)
    • Feb 2021 (1)
    • Jan 2021 (2)
  • 2020

    • Dec 2020 (1)
    • Nov 2020 (2)
RSS feed.    Made with tg-archive
  • 01 April 2025 (15 messages)
  • @m3xTa1nes #9310 02:10 AM, 01 Apr 2025
    Joined.
  • @HughEverett โ†ถ Reply to #9307 #9311 08:28 AM, 01 Apr 2025
    Yeah, the current implementation is also not perfect, but it just works. At the time when I implemented this, we didn't have Zydis in our kernel codes. Now that we also have Zydis in the kernel, we could reimplement it even better.
  • @honorary_bot #9312 08:58 AM, 01 Apr 2025
    Fun fact about windows virtual unwinding machine btw: they do have virtual opcodes for function prolog reconstruction. But they donโ€™t have such opcodes for epilogue, so they literally disassemble function epilogue if they need to unwind the stack on rip located in the function epilogue. This also defies the whole purpose of this virtual unwinding machine which was supposed to be machine independent.
  • @HughEverett โ†ถ Reply to #9312 #9313 08:59 AM, 01 Apr 2025
    ๐Ÿ˜…๐Ÿ˜…
  • @6176993302 #9314 09:17 AM, 01 Apr 2025
    well it looks like stack walk is a headache really but i will need it in my project
  • @6176993302 #9315 09:17 AM, 01 Apr 2025
    most edr
  • @6176993302 #9316 09:18 AM, 01 Apr 2025
    now use the call stack analysis to catch malicious patterns (example : direct syscalls etc)
  • @6176993302 #9317 09:34 AM, 01 Apr 2025
    Btw procmon really implement a very good stack dump analysis example but it's not open slurce๐Ÿ˜ข๐Ÿ˜‚
  • @6176993302 โ†ถ Reply to #9309 #9318 09:36 AM, 01 Apr 2025
    Thanks for this good example I will try to get an idea from it
  • @honorary_bot โ†ถ Reply to #9317 #9319 10:03 AM, 01 Apr 2025
    Well it just uses dbghelp library
  • @honorary_bot #9320 10:03 AM, 01 Apr 2025
    https://learn.microsoft.com/en-us/windows/win32/api/dbghelp/nf-dbghelp-stackwalk
    StackWalk function (dbghelp.h) - Win32 apps

    Obtains a stack trace. (StackWalk)

  • @6176993302 #9321 12:26 PM, 01 Apr 2025
    Unfortunately we cannot take advantage of this library .. since from what I have read in hyperdvg doc.. the parsing of the stack frames happened in vmx root mode
  • @honorary_bot #9322 12:27 PM, 01 Apr 2025
    I was just pointing out it is not implemented in procmon itself
  • @6176993302 #9323 03:10 PM, 01 Apr 2025
    Yes bro got your idea ^^
  • @6176993302 #9324 03:10 PM, 01 Apr 2025
    Let's see what we can do with this nightmare xd
  • 02 April 2025 (2 messages)
  • @6176993302 #9325 06:05 PM, 02 Apr 2025
    @HughEverett bro
  • @6176993302 #9326 06:07 PM, 02 Apr 2025
    Have you test before the effect of excessive I/O operation on the behavior of hyperdbg
  • 03 April 2025 (22 messages)
  • @6176993302 #9327 12:49 AM, 03 Apr 2025
    @HughEverett brother i was reading intel manuel
  • @6176993302 #9328 12:50 AM, 03 Apr 2025
    i think this will solve the issue of extensive vm-exit due to Access/dirty bits access by the CPU
  • @6176993302 #9329 12:50 AM, 03 Apr 2025
    The Intel 64 architecture supports accessed and dirty flags in ordinary paging-structure entries (see Section
    4.8). Some processors also support corresponding flags in EPT paging-structure entries. Software should read the
    VMX capability MSR IA32_VMX_EPT_VPID_CAP (see Appendix A.10) to determine whether the processor supports
    this feature.
    Software can enable accessed and dirty flags for EPT using bit 6 of the extended-page-table pointer (EPTP), a VM execution control field (see Table 25-9 in Section 25.6.11). If this bit is 1, the processor will set the accessed and
    dirty flags for EPT as described below. In addition, setting this flag causes processor accesses to guest paging structure entries to be treated as writes (see below and Section 29.3.3.2).
  • @6176993302 #9330 12:53 AM, 03 Apr 2025
    i will modify this bit number 6 in the EPTP pointer tomorrow and see what will happen , i will share the results
  • @freebits #9331 06:32 AM, 03 Apr 2025
    Joined.
  • @xatat26 #9332 03:20 PM, 03 Apr 2025
    Hi how can i get hyperdbg work between two physical machines as a debugger and debugee mode? where i can use its full potential of kernel modules debugging?
  • @xatat26 #9333 03:21 PM, 03 Apr 2025
    Do i need to get a special serial cable for it to connect between the machines? What are my best options to use hyperdbg between two physical machines?
  • @xatat26 #9334 03:23 PM, 03 Apr 2025
    Thank y0u for the awesome debugger. I was in original osta2 beta hyperdbg class for testing/feedback. it feels great to see that lot of work and improvement has been done since.
  • @HughEverett โ†ถ Reply to #9326 #9335 04:22 PM, 03 Apr 2025
    Yes, HyperDbg has been tested under heavy I/O operations, but the answer to this question is relative. Technically, it can generate a large number of events within seconds, so the impact depends on the specific number of events being used.
  • @HughEverett โ†ถ Reply to #9330 #9336 04:24 PM, 03 Apr 2025
    Yes, but isn't it just for EPT page-tables?
  • @HughEverett #9337 04:25 PM, 03 Apr 2025
    I mean to me, from the description of what you sent, it seems that it's only for EPT page tables, not for the regular OS page tables. ๐Ÿค”
  • @HughEverett โ†ถ Reply to #9332 #9338 04:27 PM, 03 Apr 2025
    You need to use it in the VMI mode, currently HyperDbg over two physical machines is not supported but it's in a priority list that we will implement Intel E1000 NIC drivers for HyperDbg so it could connect to the network over ethernet (at least for Intel consumer NICs).
  • @HughEverett #9339 04:28 PM, 03 Apr 2025
    But, it's on the todo list right now, not yet implemented. I'll notify it in the Twitter and different social platform accounts of HyperDbg once it's available.
  • @HughEverett โ†ถ Reply to #9332 #9340 04:29 PM, 03 Apr 2025
    Right now, you might also want to try pulsedbg, I think it supports debugging over two different physical machines. @honorary_bot could provide more information.
  • @6176993302 โ†ถ Reply to #9337 #9341 04:34 PM, 03 Apr 2025
    The doc of intel didn't explain this feature well... here is what I found
  • @6176993302 #9342 04:35 PM, 03 Apr 2025
    When you set the 6 bit of EPTP pointer to 1 , access from the cpu to "guest page tables entries" will be cause an ept violation with "write access"
  • @6176993302 #9343 04:37 PM, 03 Apr 2025
    So when I tried to search for the addresses code that cause the vm exit in this scenario most of it were "read access" like cmp [rax+4], 0xfe
  • @6176993302 #9344 04:37 PM, 03 Apr 2025
    Even if you want to monitor "write access" only on guest page table entries
  • @6176993302 #9345 04:37 PM, 03 Apr 2025
    That sounds crazy right๐Ÿ˜‚
  • @6176993302 #9346 04:38 PM, 03 Apr 2025
    And this freez the vm because of the large number of vm exit
    ..
  • @6176993302 #9347 04:38 PM, 03 Apr 2025
    So when I unset that bit 6, I didn't catch this kind of vm exits..
  • @6176993302 #9348 04:39 PM, 03 Apr 2025
    So yeah it's related to Access/dirty bits of ept entries but also it influence somehow ept violation related to guest page table entries
  • 04 April 2025 (11 messages)
  • @6176993302 #9349 01:54 PM, 04 Apr 2025
    @HughEverett bro hyperhv.dll , hyperlog.dll and hyperdbg_driver are loaded successfully to the kernel however I don't know how to communicate with these components to display outputs and the results of my tests .. I'm trying to build hyperdbg_driver to be like a small edr based on hyperhv
  • @6176993302 #9350 01:55 PM, 04 Apr 2025
    But it's not really documented how we can do that๐Ÿ˜…๐Ÿ˜ข
  • @HughEverett โ†ถ Reply to #9349 #9351 08:16 PM, 04 Apr 2025
    Hyperlog.dll is responsible for transferring buffers to user mode.
  • @HughEverett โ†ถ Reply to #9351 #9352 08:17 PM, 04 Apr 2025
    It works by sending a couple of functions (callbacks) to the hyperhv.dll (and of course hyperkd.sys).
  • @HughEverett #9353 08:17 PM, 04 Apr 2025
    You need to make sure to call the initialization functions of hyperlog.dll.
  • @6176993302 #9354 08:23 PM, 04 Apr 2025
    Okay bro
  • @6176993302 #9355 08:23 PM, 04 Apr 2025
    But my question
  • @6176993302 #9356 08:24 PM, 04 Apr 2025
    Is it possible to not interfere with hyperjd.sys code
  • @6176993302 #9357 08:24 PM, 04 Apr 2025
    ๐Ÿ˜‚๐Ÿ˜‚
  • @6176993302 #9358 08:25 PM, 04 Apr 2025
    I mean logically hyperkd.sys was built on the top of hyperhv as backbone
  • @6176993302 #9359 08:26 PM, 04 Apr 2025
    Why I cannot do the same ๐Ÿ˜’๐Ÿ˜ข๐Ÿ˜‚ I mean I'm more comfortable with hypehv.sys code and like I don't want to destroy the logic of my code
  • 05 April 2025 (5 messages)
  • @dgjblapp #9360 02:30 PM, 05 Apr 2025
    Joined.
  • @HughEverett โ†ถ Reply to #9356 #9361 02:33 PM, 05 Apr 2025
    Yes of course. You just need to initialize it from the hyperhv project or if you have a top-level project, you could initialize it from the top-level project
  • @HughEverett โ†ถ Reply to #9359 #9362 02:34 PM, 05 Apr 2025
    The exact initialization routines can be used (called) from hyperhv.
  • @6176993302 #9363 03:06 PM, 05 Apr 2025
    Great bro thanks very much
  • @7381257701 #9364 11:10 PM, 05 Apr 2025
    Joined.
  • 06 April 2025 (5 messages)
  • @HyperDbgBot #9365 b o t 10:02 AM, 06 Apr 2025
    [discord] <spliii> Hello hello
  • @HyperDbgBot #9366 b o t 10:03 AM, 06 Apr 2025
    [discord] <spliii> i dont know if this is the right place but im about to start working on implementing AMD support for HyperDbg ^^
  • @HyperDbgBot #9367 b o t 10:04 AM, 06 Apr 2025
    [discord] <spliii> And wanted to ask for permission to do so and to let everyone know i am about to go do this ๐Ÿ˜„
  • @HyperDbgBot #9368 b o t 10:05 AM, 06 Apr 2025
    [discord] <spliii> will open a discussion on github as well ๐Ÿ™‚
  • @HughEverett โ†ถ Reply to #9366 #9369 10:37 PM, 06 Apr 2025
    It would be great. Looking forward to see how it works. You can also consider merging it to the HyperDbg repo. ๐Ÿ‘Œ๐Ÿ‘
  • 09 April 2025 (44 messages)
  • @6176993302 #9371 09:20 PM, 09 Apr 2025
    @honorary_bot people of intel cpu ... why it seems that there is a tons of academic papers with graphs /algorithms/schema ๐Ÿ“Š etc about cpu side channel attacks but it seems that the only one with a real proof of concept is the famous specter/meltdown vulnerability?
  • @honorary_bot #9372 09:26 PM, 09 Apr 2025
    are you asking why there are no PoCs?
  • @honorary_bot #9373 09:27 PM, 09 Apr 2025
    I'm kinda sure there public PoCs for ridl and l1tf
  • @honorary_bot #9374 09:28 PM, 09 Apr 2025
    They just require a more complex setup
  • @honorary_bot #9375 09:28 PM, 09 Apr 2025
    But the idea is always the same - you just use prime and probe and look for stale data
  • @6176993302 #9376 10:00 PM, 09 Apr 2025
    Ridley and l1tf?names for other side channel vulnerabilities?
  • @honorary_bot #9377 10:01 PM, 09 Apr 2025
    The "popular" ones so to say
  • @honorary_bot #9378 10:01 PM, 09 Apr 2025
    https://docs.kernel.org/admin-guide/hw-vuln/l1tf.html
  • @honorary_bot #9379 10:01 PM, 09 Apr 2025
    https://mdsattacks.com/files/ridl.pdf
    None
  • @honorary_bot #9380 10:01 PM, 09 Apr 2025
    there are more and more
  • @honorary_bot #9381 10:02 PM, 09 Apr 2025
    Pretty googlable
  • @6176993302 #9382 10:04 PM, 09 Apr 2025
    Well that looks delicious ๐Ÿ˜‹ ๐Ÿ˜
  • @6176993302 #9383 10:04 PM, 09 Apr 2025
    Must read..
  • @6176993302 #9384 10:05 PM, 09 Apr 2025
    Btw , how the researchers managed to know
  • @6176993302 #9385 10:05 PM, 09 Apr 2025
    That the cpu behave exactly while doing some
  • @6176993302 #9386 10:06 PM, 09 Apr 2025
    Brunch prediction
  • @6176993302 #9387 10:07 PM, 09 Apr 2025
    I mean is it a public info in sole Manuel Intel or they had to make some serious hare reverse
  • @6176993302 #9388 10:07 PM, 09 Apr 2025
    Engineering
  • @honorary_bot #9389 10:09 PM, 09 Apr 2025
    Wikipedia has the history here https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability). But in essence around 2016 Ander Fogh and Daniel Gruss made and attempt to read the kernel data with prime and probe techinque. Thier result was negative but it got people thinking and trying out different stuff and eventually opening a pandora's box
    Meltdown (security vulnerability)

    vulnerability in modern microprocessors which permits unauthorized memory reads

  • @honorary_bot #9390 10:10 PM, 09 Apr 2025
    Anders' thinking originally was based on CPU pipeline model thought experiment
  • @honorary_bot #9391 10:11 PM, 09 Apr 2025
    Of course, external researchers don't have clue on how the pipeline is designed, but they can make thier guesses
  • @6176993302 #9392 10:13 PM, 09 Apr 2025
    Okay so it's all about hard work and analyzing the behavior of cpu.. well that's not easy xd
  • @honorary_bot #9393 10:14 PM, 09 Apr 2025
    But again, cpu pipelines are not a mystery, you can learn how to build those from books like "computer architecture: a quantative approach"
  • @6176993302 #9394 10:14 PM, 09 Apr 2025
    I don't remember a friend send me a research about some guys managed to find some hidden intel instructions... they can be enabled just by some weird wqys
  • @honorary_bot #9395 10:14 PM, 09 Apr 2025
    And then it boils down to the implementation details
  • @6176993302 #9396 10:14 PM, 09 Apr 2025
    They discover these instructions by a power analysis..
  • @honorary_bot โ†ถ Reply to #9394 #9397 10:14 PM, 09 Apr 2025
    yeah, guys from positive technologies
  • @honorary_bot #9398 10:15 PM, 09 Apr 2025
    there are some instructions that can only be enabled after red unlock, right
  • @honorary_bot #9399 10:15 PM, 09 Apr 2025
    those are for internal testing and debugging
  • @6176993302 #9400 10:16 PM, 09 Apr 2025
    @HughEverett sorry ๐Ÿ˜ž bro for flooding the group with cpu channels stuffs I'm just taking a break from hypervisor bugs now xd
  • @6176993302 #9401 10:16 PM, 09 Apr 2025
    @HughEverett well that sounds some really interesting subjects...
  • @honorary_bot #9402 10:18 PM, 09 Apr 2025
    speaking of meltdown, lunar lake cpus introduced a final hw mitigation against it,,, finally
  • @honorary_bot #9403 10:18 PM, 09 Apr 2025
    it's alreay described in sdm
  • @honorary_bot #9404 10:19 PM, 09 Apr 2025
    called LASS - linear address space separation
  • @honorary_bot #9405 10:19 PM, 09 Apr 2025
    in short - addresses with highest bits set are considered as kernel addresses
  • @honorary_bot #9406 10:20 PM, 09 Apr 2025
    so the cpu doesnt have to consult ptes anymore and check if they are u or s
  • @honorary_bot #9407 10:20 PM, 09 Apr 2025
    because of that there is no sidechannel while cpu is doing a page walk
  • @6176993302 #9408 10:20 PM, 09 Apr 2025
    Okay so when cpu see ffffff
  • @6176993302 #9409 10:21 PM, 09 Apr 2025
    No need to check the privilege but
  • @6176993302 #9410 10:21 PM, 09 Apr 2025
    Bit* in pte
  • @honorary_bot #9411 10:21 PM, 09 Apr 2025
    exactly
  • @honorary_bot #9412 10:22 PM, 09 Apr 2025
    there will be no speculative fetch for this address, since you have your current cpl immediately
  • @honorary_bot #9413 10:35 PM, 09 Apr 2025
    hehe, lunar lake also fixed ridl and alike
  • @honorary_bot #9414 10:36 PM, 09 Apr 2025
    by removing hyperthreading
  • 11 April 2025 (2 messages)
  • @lostit_dev #9415 03:49 AM, 11 Apr 2025
    Joined.
  • @RootSpecter #9416 05:30 AM, 11 Apr 2025
    Joined.
  • 13 April 2025 (3 messages)
  • @HyperDbgChannel #9417 11:24 PM, 13 Apr 2025
    HyperDbg v0.13.1 has been released. ๐Ÿ’ซ

    This version includes improved mitigations against anti-hypervisor techniques used to detect nested virtualization environments, along with various bug fixes.

    Check it out:
    https://github.com/HyperDbg/HyperDbg/releases
    Releases ยท HyperDbg/HyperDbg

    State-of-the-art native debugging tools. Contribute to HyperDbg/HyperDbg development by creating an account on GitHub.

  • @LolyRoP #9418 11:31 PM, 13 Apr 2025
    Joined.
  • @oxidationsec #9419 11:45 PM, 13 Apr 2025
    Joined.
  • 14 April 2025 (1 messages)
  • @miladien #9420 06:08 AM, 14 Apr 2025
    Joined.
  • 17 April 2025 (1 messages)
  • @t0r0_ru #9421 10:27 AM, 17 Apr 2025
    Joined.
  • 19 April 2025 (9 messages)
  • @t0r0_ru #9422 10:41 AM, 19 Apr 2025
    Hello friends. I need help with debugger. I wish use it debugger in VMI mode but I catch a bug and solution "if you want to test the user-mode debugger in VMI Mode, you should build HyperDbg with special instructions." . Thank you in advance
  • @t0r0_ru #9423 10:44 AM, 19 Apr 2025
    And next question - how run debugger in LOCAL kernel mode? I read the documentation but didn't understand.
  • @HughEverett โ†ถ Reply to #9422 #9424 02:03 PM, 19 Apr 2025
    Hey ๐Ÿ‘‹
    You need to use the debugger either in the VMI Mode (local debugging) or the Debugger Mode (full-featured debugging). If you are debugging in VMI mode, you cannot pause (halt) the debugger or step through instructions but in the debugger mode, everything is supported. HyperDbg works best in VMware Workstation's nested virtualization (note that VMware workstation is now free).
  • @HughEverett โ†ถ Reply to #9423 #9425 02:06 PM, 19 Apr 2025
    Not sure if I understand the question, but there are tons of examples available in the HyperDbg's course that you can see:

    https://ost2.fyi/Dbg3301

    Or YouTube:
    https://www.youtube.com/watch?v=RDlp0PCFgxI&list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY
    Debuggers 3301: HyperDbg

    This class teaches you how to use HyperDbg, a virtualization-based debugger.

  • @t0r0_ru #9426 02:08 PM, 19 Apr 2025
    I compiled sources for case USER mode , but I catched BSOD
  • @t0r0_ru #9427 02:10 PM, 19 Apr 2025
    OK. But host debugger in case Debug Mode can't connect to VMWare and via COM 3 and via named pape
  • @HughEverett โ†ถ Reply to #9426 #9428 02:19 PM, 19 Apr 2025
    Do not use the user-mode debugger in VMI Mode for now. HyperDbg in the Debugger Mode fully supports user-mode and kernel-mode debugging.
  • @HughEverett โ†ถ Reply to #9427 #9429 02:20 PM, 19 Apr 2025
    Did you follow the steps mentioned in this video?

    https://youtu.be/MDZ9zYfqo50
    Dbg3301: HyperDbg 02 04 HyperDbg Lab Setup

    View the full free MOOC at https://ost2.fyi/Dbg3301. This course is an introductory guide to HyperDbg debugger, guiding you through the initial steps of using HyperDbg, covering essential concepts, principles, debugging functionalities, along with practical examples and numerous reverse engineering methods that are unique to HyperDbg. Whether you have an interest in reverse engineering or seek to elevate your reverse engineering skills with hypervisor-assisted approaches, this course provides a solid foundation for starting your journey.

  • @HughEverett โ†ถ Reply to #9429 #9430 02:20 PM, 19 Apr 2025
    If yes, then what is the exact error that is happening for you?
  • 20 April 2025 (9 messages)
  • @asqdads #9431 12:59 PM, 20 Apr 2025
    How should I change how to make this tester run in a virtual machine, I've changed the name of the named pipe why can't connect

    photo_2025-04-20_12-59-00.jpg
  • @6176993302 #9432 03:06 PM, 20 Apr 2025
    You are running hyperdbg_app.exe
  • @6176993302 #9433 03:07 PM, 20 Apr 2025
    I think u should run
  • @6176993302 #9434 03:07 PM, 20 Apr 2025
    Hyperdbg-client.ewe
  • @6176993302 #9435 03:07 PM, 20 Apr 2025
    Exe*
  • @asqdads #9436 03:28 PM, 20 Apr 2025
    i try both of them ๏ผŒno one can run ๏ผŒi change another hypervisor
  • @asqdads #9437 03:28 PM, 20 Apr 2025
    thx
  • @HughEverett โ†ถ Reply to #9431 #9438 06:01 PM, 20 Apr 2025
    Yes, as Poikourditchy78 mentioned, you are running the wrong file. In the VM (guest), there is no named pipe, but instead, it's either COM1 or COM2.
  • @HughEverett โ†ถ Reply to #9431 #9439 06:03 PM, 20 Apr 2025
    I recommend running HyperDbg's main client (hyperdbg-cli.exe), and then once you find the correct parameters on each side (host and guest), then try again. Note that, you also need to run the client in the host (not just guest).
  • 21 April 2025 (1 messages)
  • @6176993302 #9440 08:30 PM, 21 Apr 2025
    @HughEverett in your opinion how much time it will take to create hyperdbg for linux?
  • 22 April 2025 (59 messages)
  • @HughEverett โ†ถ Reply to #9440 #9441 09:05 AM, 22 Apr 2025
    Hi
    I estimate it to be done within 6 months to one year depending on the skill and knowledge of the person who wants to implement it (I mean the Linux kernel knowledge, I don't have that much information about Linux and how it works).
  • @getting458 #9442 02:06 PM, 22 Apr 2025
    Joined.
  • @getting458 #9443 02:07 PM, 22 Apr 2025
    hi
  • @getting458 #9444 02:07 PM, 22 Apr 2025
    Does anyone have an example of RW?
  • @getting458 #9445 02:55 PM, 22 Apr 2025

    photo_2025-04-22_14-55-50.jpg
  • @getting458 #9446 02:55 PM, 22 Apr 2025

    photo_2025-04-22_14-55-57.jpg
  • @getting458 #9447 02:56 PM, 22 Apr 2025
    Anyone know what I'm missing?
  • @getting458 #9448 04:33 PM, 22 Apr 2025
    Who knows that although I used my signature, I still can't load the driver?
  • @getting458 #9449 04:34 PM, 22 Apr 2025
    I'm going to set hyperdbg to a process that belongs to me.
  • @6176993302 โ†ถ Reply to #9446 #9450 05:00 PM, 22 Apr 2025
    I think u didn't clone correctly the repos
  • @6176993302 #9451 05:01 PM, 22 Apr 2025
    Ia32 and some other dependencies will be downloaded automatically with git clone --recursive
  • @getting458 #9452 05:49 PM, 22 Apr 2025
    Yes, I solved this mistake. But I don't understand why my signature can't be loaded on the driver.
  • @getting458 #9453 05:49 PM, 22 Apr 2025
    It can only be loaded in test mode. Does it only support test mode?
  • @honorary_bot #9454 05:59 PM, 22 Apr 2025
    This is how self signed drivers work
  • @honorary_bot #9455 05:59 PM, 22 Apr 2025
    Only in test mode
  • @getting458 โ†ถ Reply to #9454 #9456 06:24 PM, 22 Apr 2025
    I have my own ev driver signature, but even though I have signed it, it still doesn't work.
  • @honorary_bot #9457 06:25 PM, 22 Apr 2025
    Does it work with any other driver? I doubt it has anything to do with hyperdbg
  • @getting458 #9458 06:25 PM, 22 Apr 2025
    It seems that there is something wrong with the function entry.
  • @getting458 #9459 06:25 PM, 22 Apr 2025
    You must sign sys.
  • @HughEverett โ†ถ Reply to #9458 #9460 06:43 PM, 22 Apr 2025
    With function entry of HyperDbg? Have you tried to disable DSE instead of test signing mode?
  • @HughEverett #9461 06:44 PM, 22 Apr 2025
    Because I think HyperDbg just comes without signing, not with test sign.
  • @HughEverett #9462 06:46 PM, 22 Apr 2025
    So, probably that's why test signing does not work, but there are plenty of options for disabling DSE. First, you can press shift and restart and then there is a start up menu that lets you disable DSE. Second option would be connecting Kdnet for disabling DSE and if you don't want to use kdnet, then you can use EfiGuard for disabling patchguard and dse.
  • @HughEverett #9463 06:48 PM, 22 Apr 2025
    There are examples for all of the above mentioned methods here:

    https://docs.hyperdbg.org/getting-started/build-and-install
    Build & Install | HyperDbg Documentation

    This document helps you to build and install HyperDbg

  • @HughEverett โ†ถ Reply to #9463 #9464 06:48 PM, 22 Apr 2025
    Also, you can see the video, that shows you all of these methods step by step.
  • @getting458 #9465 09:45 PM, 22 Apr 2025
    I don't mean the test signature, I have a whql certified ev signature.
  • @getting458 #9466 09:46 PM, 22 Apr 2025
    I mean, after I sign with ev, the sys file can't be loaded, and it can only be loaded when I turn on the system test mode.
  • @getting458 #9467 09:46 PM, 22 Apr 2025
    But my ev signature is expired. But it does work, and I can load it normally in other sys files.
  • @getting458 #9468 09:47 PM, 22 Apr 2025
    I have closed dse, so it has nothing to do with dse, but the source code.
  • @HughEverett #9469 09:48 PM, 22 Apr 2025
    WHQL needs Microsoft approval from their website, you need to upload driver for them. Ev signing does not work anymore (I think it was Windows 10 22h2 that they start checking the drivers)
  • @getting458 #9470 09:48 PM, 22 Apr 2025
    I adjusted hyperkekd Function entry of, delete the iotco, and it can be loaded.
  • @HughEverett โ†ถ Reply to #9469 #9471 09:49 PM, 22 Apr 2025
    Are you test HyperDbg on old versions of Windows?
  • @getting458 โ†ถ Reply to #9469 #9472 09:49 PM, 22 Apr 2025
    But you can sign with the previous ev.
  • @getting458 โ†ถ Reply to #9471 #9473 09:49 PM, 22 Apr 2025
    I'm in the latest win10
  • @getting458 #9474 09:50 PM, 22 Apr 2025
    Wqhl authentication is only for new signatures.
  • @getting458 #9475 09:50 PM, 22 Apr 2025
    If you have an old signature. Then you can not use whql.
  • @HughEverett โ†ถ Reply to #9472 #9476 09:51 PM, 22 Apr 2025
    But it won't load in Windows 11, and newer versions of Windows 10 as far as I remember (I might be wrong). Are you sure that it works? Did you also do the same with other WDK drivers? ๐Ÿค”
  • @getting458 โ†ถ Reply to #9476 #9477 09:52 PM, 22 Apr 2025
    Yes, I can use another hyper drivers normally.
  • @getting458 #9478 09:52 PM, 22 Apr 2025
    Only hyperdbg can't be used in my ev signature.
  • @getting458 #9479 09:52 PM, 22 Apr 2025
    Test mode must be used.
  • @HughEverett #9480 09:52 PM, 22 Apr 2025
    Okay, let me give a list of drivers that you need to sign.
  • @getting458 #9481 09:52 PM, 22 Apr 2025
    So I want to know, do you all load drivers in test mode?
  • @getting458 โ†ถ Reply to #9480 #9482 09:53 PM, 22 Apr 2025
    You can send it to me for a try. The driver I compiled with wdk10 can be loaded normally.
  • @HughEverett โ†ถ Reply to #9480 #9483 09:54 PM, 22 Apr 2025
    hyperhv.dll
    hyperkd.sys
    hyperlog.dll
    kdserial.dll
  • @getting458 #9484 09:54 PM, 22 Apr 2025
    dll
  • @HughEverett โ†ถ Reply to #9483 #9485 09:54 PM, 22 Apr 2025
    You need to sign all of these drivers.
  • @getting458 #9486 09:54 PM, 22 Apr 2025
    Dll files also need to be signed? I don't understand.
  • @HughEverett โ†ถ Reply to #9486 #9487 09:54 PM, 22 Apr 2025
    Yes, a DLL could be a driver (kernel mode DLL).
  • @getting458 #9488 09:54 PM, 22 Apr 2025
    Maybe I missed this question.
  • @HughEverett โ†ถ Reply to #9488 #9489 09:55 PM, 22 Apr 2025
    Of course, if you just not sign one of them, it won't work.
  • @getting458 #9490 09:55 PM, 22 Apr 2025
    But is the mode it wants to sign kernel mode or application mode?
  • @getting458 #9491 09:55 PM, 22 Apr 2025
    I only signed the sys file.
  • @HughEverett #9492 09:55 PM, 22 Apr 2025
    DLLs can be also signed.
  • @HughEverett #9493 09:56 PM, 22 Apr 2025
    I remember years ago I signed HyperDbg and all of the DLLs are also needed to be signed. I mean kernel-mode (driver) DLLs, not user-mode DLLs.
  • @getting458 #9494 09:56 PM, 22 Apr 2025
    Maybe that's why I'll test it tomorrow. thank you
  • @getting458 #9495 09:58 PM, 22 Apr 2025
    I want to use it in a game.
  • @getting458 #9496 09:58 PM, 22 Apr 2025
    ๐Ÿ˜‚
  • @HughEverett #9497 09:58 PM, 22 Apr 2025
    Also, make sure to keep your signed drivers for your own use only. If Microsoft finds your signed drivers, they will blacklist your signature.
  • @getting458 #9498 09:58 PM, 22 Apr 2025
    Use ept hook to bypass integrity check.
  • @HughEverett โ†ถ Reply to #9495 #9499 10:03 PM, 22 Apr 2025
    Bypassing game anti-cheat systems is illegal in many countries. Tools like HyperDbg should be used responsibly for legitimate purposes such as security research and malware analysis. Put them to good use.
  • 23 April 2025 (3 messages)
  • @395437265 โ†ถ Reply to #9499 #9501 08:29 AM, 23 Apr 2025
    Well... ๐Ÿ˜‚
  • @getting458 #9502 10:09 AM, 23 Apr 2025
    Can it be used to monitor processes on X86?
  • @HughEverett โ†ถ Reply to #9502 #9503 01:18 PM, 23 Apr 2025
    Yes, there is no difference between debugging a x86 process and a x64 process in HyperDbg. Both of them are supported.
  • 24 April 2025 (1 messages)
  • @HyperDbgBot #9504 b o t 03:53 PM, 24 Apr 2025
    [discord] <t0int> when will hyperdbg support usermode stuff?
  • 25 April 2025 (3 messages)
  • @HughEverett โ†ถ Reply to #9504 #9505 10:25 AM, 25 Apr 2025
    Do you mean supporting user mode debugging in the VMI mode? Right now, HyperDbg fully supports user mode debugging in the Debugger mode.
  • @HyperDbgBot #9506 b o t 10:39 AM, 25 Apr 2025
    [discord] <t0int> docs are saying its unstable
  • @HughEverett โ†ถ Reply to #9506 #9507 10:58 AM, 25 Apr 2025
    Docs talk about user mode debugging in the VMI mode. In the debugger mode, everything is fine.
  • 27 April 2025 (94 messages)
  • @6695510551 #9508 01:14 PM, 27 Apr 2025
    @HughEverett hi bro, I have a problem.
    I set up three eph hooks, but it seems that only the third one is working.
  • @6695510551 #9509 01:15 PM, 27 Apr 2025

    photo_2025-04-27_13-15-00.jpg
  • @6695510551 #9510 01:16 PM, 27 Apr 2025

    photo_2025-04-27_13-16-50.jpg
  • @6176993302 #9511 03:21 PM, 27 Apr 2025
    For the first two hooks It looks like they two addressed belongs to the same page which means u cannot put two hooks on them if I'm not wrong but @HughEverett need to confirm that
  • @6695510551 #9512 03:25 PM, 27 Apr 2025
    If I only set test1, it won't work too
  • @6695510551 #9513 03:29 PM, 27 Apr 2025

    photo_2025-04-27_15-29-24.jpg
  • @6695510551 #9514 03:29 PM, 27 Apr 2025
    I only set test1, and I can see the code of test1.
  • @6695510551 #9515 03:31 PM, 27 Apr 2025
    it not work๐Ÿ˜ข
  • @HughEverett โ†ถ Reply to #9511 #9516 04:24 PM, 27 Apr 2025
    No, this limitation is only for the !monitor command. The !epthook does not have such a limitation.
  • @HughEverett โ†ถ Reply to #9513 #9517 04:25 PM, 27 Apr 2025
    Are you sure you're putting hooks in instructions boundaries? I mean into valid RIP addresses? Can you send a disassembly of this addresses (using the 'u' command).
  • @HughEverett โ†ถ Reply to #9513 #9518 04:26 PM, 27 Apr 2025
    And is it a notmal code? Or a self modifying code?
  • @6695510551 #9519 04:26 PM, 27 Apr 2025

    photo_2025-04-27_16-26-34.jpg
  • @6695510551 #9520 04:26 PM, 27 Apr 2025
    just like this
  • @6695510551 #9521 04:27 PM, 27 Apr 2025
    this is the code of demo
  • @HughEverett โ†ถ Reply to #9521 #9522 04:28 PM, 27 Apr 2025
    So, what are those addresses? Are you using VMWare?
  • @6695510551 #9523 04:29 PM, 27 Apr 2025
    yes, vmware 17
  • @HughEverett #9524 04:29 PM, 27 Apr 2025
    And are you sure those memory addresses are called? You can test it by using the 'bp' command. Double check if the breakpoint is hit.
  • @6695510551 #9525 04:31 PM, 27 Apr 2025
    e... this is .connect local
  • @6695510551 #9526 04:32 PM, 27 Apr 2025
    can bp work under .connect local ?
  • @6695510551 #9527 04:34 PM, 27 Apr 2025

    photo_2025-04-27_16-34-29.jpg
  • @6695510551 #9528 04:34 PM, 27 Apr 2025
    I can see the code for both of them
  • @6695510551 #9529 04:35 PM, 27 Apr 2025
    but only can epthook the GetWindow, windows API
  • @HughEverett โ†ถ Reply to #9526 #9530 04:37 PM, 27 Apr 2025
    No, connect to it from host using the '.debug' command.
  • @6695510551 #9531 04:40 PM, 27 Apr 2025
    sry, I have never used '.debug' before.
  • @6695510551 #9532 04:40 PM, 27 Apr 2025
    ๐Ÿ˜ž
  • @HughEverett โ†ถ Reply to #9531 #9533 04:41 PM, 27 Apr 2025
    Use this instructions:

    https://docs.hyperdbg.org/getting-started/attach-to-hyperdbg/debug
    Attach to a remote machine | HyperDbg Documentation

    Remote debugging in VMI Mode and Debugger Mode

  • @6695510551 #9534 04:42 PM, 27 Apr 2025
    ok, let me see
  • @6695510551 #9535 05:16 PM, 27 Apr 2025
    I have tried many times, but I am unable to input anything
  • @6695510551 #9536 05:16 PM, 27 Apr 2025
    this is guest

    photo_2025-04-27_17-16-47.jpg
  • @6695510551 #9537 05:16 PM, 27 Apr 2025
    this is host

    photo_2025-04-27_17-16-57.jpg
  • @HughEverett โ†ถ Reply to #9537 #9538 05:17 PM, 27 Apr 2025
    Yes, this is correct.
  • @HughEverett #9539 05:18 PM, 27 Apr 2025
    Now you need to press CTRL+C in the host.
  • @HughEverett โ†ถ Reply to #9539 #9540 05:18 PM, 27 Apr 2025
    It will pause the debuggee.
  • @6695510551 #9541 05:19 PM, 27 Apr 2025
    Oh, I understand now. So that's how it works
  • @6695510551 #9542 05:20 PM, 27 Apr 2025
    The working style is like windbg
  • @HughEverett โ†ถ Reply to #9542 #9543 05:26 PM, 27 Apr 2025
    Yes, but using HyperDbg is more complicated compared to other debuggers mainly because it operates on VMX root mode which you need to know lots of different concepts, use it based on different system-level considerations and hypervisor-based techniques. It's not like opening and working with it without prior knowledge. I highly recommend going through HyperDbg course in open security trainings or YouTube before using it:

    https://ost2.fyi/Dbg3301

    Or,

    https://www.youtube.com/watch?v=RDlp0PCFgxI&list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY
    Debuggers 3301: HyperDbg

    This class teaches you how to use HyperDbg, a virtualization-based debugger.

  • @6695510551 #9544 05:30 PM, 27 Apr 2025
    ๐Ÿ˜ณYes, I feel it. Is there a written version of the instructions for use?
  • @HughEverett โ†ถ Reply to #9544 #9545 05:31 PM, 27 Apr 2025
    There are examples in the docs.hyperdbg.org but the videos are better to start with.
  • @6695510551 #9546 05:32 PM, 27 Apr 2025
    unfortunately, my English is not good.๐Ÿ˜ฑ
  • @6695510551 #9547 05:33 PM, 27 Apr 2025
    I will try, at least let me use bp
  • @6695510551 #9548 06:17 PM, 27 Apr 2025

    photo_2025-04-27_18-17-50.jpg
  • @6695510551 #9549 06:18 PM, 27 Apr 2025
    I only called it once, why does the breakpoint keep hitting ?
  • @6695510551 #9550 06:18 PM, 27 Apr 2025
    ๐Ÿ˜‚
  • @honorary_bot #9551 06:18 PM, 27 Apr 2025
    Because this is how breakpoints work?
  • @6695510551 #9552 06:19 PM, 27 Apr 2025
    maby not?
  • @6695510551 #9553 06:19 PM, 27 Apr 2025
    when I click on the vmware, the breakpoint will be hit
  • @honorary_bot #9554 06:21 PM, 27 Apr 2025
    How do you expect them to work?
  • @6695510551 #9555 06:21 PM, 27 Apr 2025
    I hope hit once
  • @honorary_bot #9556 06:22 PM, 27 Apr 2025
    Have you used a debugger before? Like windbg or something?
  • @6695510551 #9557 06:22 PM, 27 Apr 2025

    photo_2025-04-27_18-22-09.jpg
  • @honorary_bot #9558 06:22 PM, 27 Apr 2025
    Oh, that's what you mean
  • @honorary_bot #9559 06:22 PM, 27 Apr 2025
    You're expecting to catch one breakpoint inside your application, right?
  • @honorary_bot #9560 06:22 PM, 27 Apr 2025
    Got it
  • @6695510551 #9561 06:22 PM, 27 Apr 2025
    yes, I have used windbg before
  • @6695510551 โ†ถ Reply to #9559 #9562 06:23 PM, 27 Apr 2025
    yes
  • @honorary_bot #9563 06:24 PM, 27 Apr 2025
    With hypervisors breakpoints work in a different way, because the hypervisor sets a breakpoint to the guest physical address
  • @honorary_bot #9564 06:24 PM, 27 Apr 2025
    And since it is a usermode module, it is shared among several processes
  • @honorary_bot #9565 06:24 PM, 27 Apr 2025
    That's why the breakpoint may be hit
  • @honorary_bot #9566 06:24 PM, 27 Apr 2025
    I mean it might be hit in a different process as well
  • @6695510551 #9567 06:25 PM, 27 Apr 2025
    o , you are right
  • @honorary_bot #9568 06:25 PM, 27 Apr 2025
    So it makes sense when you click vmware windows, it also calls your bp'ed function
  • @6695510551 #9569 06:26 PM, 27 Apr 2025
    Thank you, I understand now
  • @honorary_bot #9570 06:26 PM, 27 Apr 2025
    So yeah, this thing is different compared to what we are used to in windbg
  • @honorary_bot #9571 06:26 PM, 27 Apr 2025
    Sorry, I misunderstood your question at first
  • @honorary_bot #9572 06:26 PM, 27 Apr 2025
    I thought you were expecting one-time only breakpoints :)
  • @honorary_bot #9573 06:27 PM, 27 Apr 2025
    @HughEverett do you filter breakpoint hits by context?
  • @honorary_bot #9574 06:28 PM, 27 Apr 2025
    What I do in this case is compare the target cr3 with bp cr3 and skip the bp if they don't match
  • @honorary_bot #9575 06:28 PM, 27 Apr 2025
    cr3 is unique to a process, so you can filter out only the needed ones
  • @6695510551 #9576 06:29 PM, 27 Apr 2025
    I don't think that judgment was made๐Ÿ˜‚
  • @honorary_bot #9577 06:29 PM, 27 Apr 2025
    I'm not sure how it's implemented in hyperdbg, maybe we just don't know something
  • @6695510551 #9578 06:31 PM, 27 Apr 2025
    It's strange why the breakpoint of test1 wasn't hit
  • @honorary_bot #9579 06:31 PM, 27 Apr 2025
    How do you know if it wasnt?
  • @6695510551 #9580 06:32 PM, 27 Apr 2025
    I set a breakpoint by bp
  • @honorary_bot #9581 06:32 PM, 27 Apr 2025
    You had several hits, right? One of those might be from your app
  • @6695510551 #9582 06:32 PM, 27 Apr 2025
    When I run test1(), the breakpoint was not hit
  • @6695510551 #9583 06:33 PM, 27 Apr 2025
    The Successful one is GetWindow, it not test1()
  • @honorary_bot #9584 06:34 PM, 27 Apr 2025
    How do you set it? Before running the app?
  • @honorary_bot #9585 06:34 PM, 27 Apr 2025
    DO you pause the app and then set the bp?
  • @6695510551 #9586 06:35 PM, 27 Apr 2025
    CTRL+C / .process pid xxx / g / bp addr
  • @honorary_bot โ†ถ Reply to #9586 #9587 06:36 PM, 27 Apr 2025
    Is test running before this? Is it on pause or something? It's not clear from the source code
  • @6695510551 #9588 06:36 PM, 27 Apr 2025
    Maybe I did something wrong, or maybe it's a console app
  • @6176993302 #9589 06:36 PM, 27 Apr 2025
    Oh right sorry I didn't read about epthool how it was designed I focused more on !monitor .. and obviously the hook operate on a page level of 4kb so u cannot put two different config for two addresses of the same page
  • @6176993302 #9590 06:36 PM, 27 Apr 2025
    No, this limitation is only for the !monitor command. The !epthook does not have such a limitation.
  • @6695510551 #9591 06:38 PM, 27 Apr 2025
    Try the MFC exe tomorrow ๐Ÿ˜‚
  • @honorary_bot #9592 06:38 PM, 27 Apr 2025
    It should not be the problem
  • @6695510551 #9593 06:40 PM, 27 Apr 2025
    Thank you, I will try my idea tomorrow
  • @6695510551 #9594 06:41 PM, 27 Apr 2025

    photo_2025-04-27_18-41-38.jpg
  • @honorary_bot #9595 06:41 PM, 27 Apr 2025
    Good night then :)
  • @6695510551 #9596 06:41 PM, 27 Apr 2025
    It's too late, I'm already confused
  • @6695510551 #9597 06:42 PM, 27 Apr 2025
    Good night
  • @HughEverett โ†ถ Reply to #9573 #9598 09:10 PM, 27 Apr 2025
    No, by default HyperDbg won't filter anything unless you explicitly mention it using the 'pid xx' or 'tid xx' or 'core xx' parameters:

    https://docs.hyperdbg.org/commands/debugging-commands/bp
    bp (set breakpoint) | HyperDbg Documentation

    Description of the 'bp' command in HyperDbg.

  • @HughEverett โ†ถ Reply to #9563 #9599 09:12 PM, 27 Apr 2025
    But you're certainly right. The reason why he/she sees this error is because the breakpoint in set system-wide.
  • @HughEverett โ†ถ Reply to #9598 #9600 09:13 PM, 27 Apr 2025
    Other than that, there are many options for setting a conditional breakpoint using the script engine (combining the 'pause' function with the '!epthook' command).

    https://docs.hyperdbg.org/commands/scripting-language/functions/debugger/pause
    pause | HyperDbg Documentation

    Description of the 'pause' function in HyperDbg Scripts

  • @HughEverett โ†ถ Reply to #9593 #9601 09:20 PM, 27 Apr 2025
    You need to use the '.start' command, so HyperDbg will intercept the first instructions (original entry point) for you. After that, you're in the context (memory space) of the process:

    https://docs.hyperdbg.org/commands/meta-commands/.start

    Please keep in mind that whenever you continue the debuggee using the 'g' command, you're no longer in the address space of the target process when you pause it again. There are options like using the '.process', '.process2', '.thread', or '.thread2' commands each of which is implemented differently and suitable for a different use case. These commands let you switch to the memory space of your process.
    .start (start a new process) | HyperDbg Documentation

    Description of the '.start' command in HyperDbg.

  • 28 April 2025 (6 messages)
  • @6695510551 #9602 05:03 AM, 28 Apr 2025
    @HughEverett I changed my MFC program and epthook is working now
  • @6695510551 #9603 05:03 AM, 28 Apr 2025
    ๐Ÿ˜‚
  • @6695510551 #9604 05:04 AM, 28 Apr 2025
    The console program may have been optimized
  • @6695510551 #9605 05:06 AM, 28 Apr 2025
    I can't hit breakpoints even with x64dbg in console program
  • @HughEverett โ†ถ Reply to #9602 #9606 08:09 AM, 28 Apr 2025
    ๐Ÿ‘
  • @ashsec #9607 02:20 PM, 28 Apr 2025
    Joined.
  • 29 April 2025 (2 messages)
  • @instw0 #9609 12:12 PM, 29 Apr 2025
    hi all ! Was it possible to do remote debugging over ethernet?
  • @HughEverett โ†ถ Reply to #9609 #9610 07:04 PM, 29 Apr 2025
    Hi,
    You can use the '.listen' command along with the '.connect' command to connect over Ethernet. But, Ethernet debugging is only supported in the VMI mode (not the debugger mode).

    https://docs.hyperdbg.org/commands/meta-commands/.listen
    .listen (listen on a port and wait for the debugger to connect) | HyperDbg Documentation

    Description of the '.listen' command in HyperDbg.

  • 30 April 2025 (5 messages)
  • @t0r0_ru โ†ถ Reply to #9537 #9611 06:29 AM, 30 Apr 2025
    I have some problem. It is possible that the debugger is frozen and does not respond to key presses. Include Ctrl-C
  • @instw0 โ†ถ Reply to #9610 #9612 07:32 AM, 30 Apr 2025
    so now you can connect via a physical ethernet cable, but only in vmi mode while it's working?
  • @HughEverett โ†ถ Reply to #9611 #9613 09:04 PM, 30 Apr 2025
    If you're breaking the guest (doing something wrong that guest crashes), the kernel of the guest will BSOD the system and obviously HyperDbg couldn't pause (CTRL+C) the guest again.
  • @HughEverett โ†ถ Reply to #9611 #9614 09:07 PM, 30 Apr 2025
    HyperDbg is highly privileged (hypervisor level), so it means you have control over the user mode applications and the OS kernel. Changing a register or a memory without knowing the consequences will definitely BSOD the guest kernel. You should know what you are trying to do.
  • @HughEverett โ†ถ Reply to #9612 #9615 09:07 PM, 30 Apr 2025
    Yes
  • 01 Apr 2025 (15)
  • 02 Apr 2025 (2)
  • 03 Apr 2025 (22)
  • 04 Apr 2025 (11)
  • 05 Apr 2025 (5)
  • 06 Apr 2025 (5)
  • 09 Apr 2025 (44)
  • 11 Apr 2025 (2)
  • 13 Apr 2025 (3)
  • 14 Apr 2025 (1)
  • 17 Apr 2025 (1)
  • 19 Apr 2025 (9)
  • 20 Apr 2025 (9)
  • 21 Apr 2025 (1)
  • 22 Apr 2025 (59)
  • 23 Apr 2025 (3)
  • 24 Apr 2025 (1)
  • 25 Apr 2025 (3)
  • 27 Apr 2025 (94)
  • 28 Apr 2025 (6)
  • 29 Apr 2025 (2)
  • 30 Apr 2025 (5)