
Powerful than ring3 debuggers, why not use ring0 debuggers directly? In this case, we also call userĪ natural question you might have is: Since ring0 debuggers are more On a typical Intel CPU, programs can run in four modes, from ring0 That modern OS such as Windows relies on the processor (e.g., IntelĬPU) to provide a layered collection of protection domains. The difference between user/kernel level debuggers is that kernelĭebuggers run with higher privilege and hence can debug kernel deviceĭrivers and devices, while user level debuggers cannot. There are two types of debuggers: user level debuggers (such as OllyDbg, Immunity Debugger, and IDA Pro), and kernel debugger (such as WinDbg, SoftIce, and Syser). To reverse engineer a malware, a quality debugger is essential. This tutorial can be used as a lab module in

Efficiently master a Ring3 debugger such as Immunity Debugger.
