Search


PDF Archive search engine
Last database update: 17 October at 15:17 - Around 76000 files indexed.


Show results per page

Results for «dword»:


Total: 4 results - 0.009 seconds

boot hang ahci ide mode 95%

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\msahci] "Start"=dword:00000000 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pciide] "Start"=dword:00000000 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\iaStorV] "Start"=dword:00000000 probably only need to do the first one.

https://www.pdf-archive.com/2015/09/17/boot-hang-ahci-ide-mode/

17/09/2015 www.pdf-archive.com

WinDbgCheatSheet 60%

bp kernel32!CreateFileW bp 0x07004020 “.echo function called;g” Clear a breakpoint Clear all breakpoints Disable a breakpoint Disable all breakpoints Set a breakpoint on memory access, size can be 1, 2, or 4 Break on symbol access Break on process creation Break on process exit Break on thread creation Break on thread exit Break on module load Break on module unload bc # bc * bd # bd * ba [rwe] [size] address bm symbol sxe cpr sxe epr sxe ct sxe et sxe ld sxe ud Registers r r reg r reg=value r reg:[iu][bwdqf] Display registers Display single register Set register value Display register value as type (see memory) Loaded Modules lm f !lmi module !dh module .imgscan Lists all loaded modules and file paths Gives detailed info about a module Displays headers for a module Scan memory for modules Symbols .sympath path ld module ld * !sym .reload [/f] ln address Set symbols path Load symbols for a module Load symbols for all modules Show the status of symbol loading Reload symbols Find nearest symbol to address Memory d[sS] [/s width] address dl address # size e[aubwdqfD] address value e[za|zu] address string c range address m range address f range pattern s range pattern !address address !vprot address !mapped_file address !heap .writemem file range Display memory a = ascii u = Unicode b = byte w = word d= dword q = qword f = float D = double Examples:

https://www.pdf-archive.com/2016/11/07/windbgcheatsheet/

07/11/2016 www.pdf-archive.com

Cracking on iPhone-Phoenixdev Tutorial 52%

this code gets the key value from the preferences plist and then sends it to sub_9B64 (which i will rename to decrypt_key) and tests a dword from the resulting buffer with 0xFF.

https://www.pdf-archive.com/2015/08/07/cracking-on-iphone-phoenixdev-tutorial/

07/08/2015 www.pdf-archive.com