Find Out What’s Running on YOUR Machine with the Windows API!
Join the Discord to chat all things malware research and Windows OS deep diving!
https://discord.gg/G9UMXm8uv3
--
In this episode of the Windows API deep dive series, we're going to talk about the all-important Windows process and how to enumerate them with the Windows API! This is super important for malware reversing and development and general OS research. I hope you enjoy, leave me a like and consider subscribing if you do!
--
Twitter:
https://twitter.com/viking_sec
Windows API Playlist:
https://www.youtube.com/watch?v=VnWOSWZthdo&list=PL1jK3K11NINgL0qUAszHwRhGIIyOvfUI9
Reverse-Reverse Engineering Playlist:
https://www.youtube.com/watch?v=RWOahxzoGCU&list=PL1jK3K11NINhvnr7Y3iGu8eLKec72Sl7D&index=3
--
Table of Contents:
0:00 Intro
0:13 Studying the Windows API
0:30 Windows Processes
1:10 Process Memory
1:45 The importance of processes
2:10 Looking at process information
3:00 The Code
4:30 Enumerating PIDs
5:00 EnumProcesses()
5:57 PIDs
9:07 Debugging EnumProcesses()
15:00 Enumerating Process Names
18:07 Windows Handles
18:40 OpenProcess()
22:09 Windows Modules
24:07 EnumProcessModules()
27:05 GetModuleBaseName()
28:23 Code Recap
29:40 Running the code
30:00 Limitations
--
#reverseengineering #windowsos #c++