Implementing OWASP ZAP Full Layout
Introduction to Full Layout In this article I'll present how I implemented the Full Layout into ZAP OWASP. Since I'm always using ZAP on small screens, it just isn't enough space to actually make use of the two layouts that are available in ZAP: the “Maximize left ...
Memory Models
Memory We know about user mode and kernel mode, and how programs in user-mode can only use the memory from 0x00000000 to 0x7FFFFFFF, while the system uses the memory from 0x80000000 to 0xFFFFFFFF. Let's talk about physical memory for a bit. Each computer must have a memory chip in ...
Introduction to Kernel Debugging
Introduction Before trying to debug the kernel, we must first understand a few things. We must know what the Rings in computer security are. Let's take a look at the picture taken from [1]: On the picture above, we can see four protection rings, which are mechanisms to protect ...
Introduction to SoftICE
It's often the case that we need to debug a kernel application, like device driverS, system calls, interrupt routines, or some other kernel application. In this article we'll talk about SoftICE kernel debugger. Installing and Configuring the SoftICE Debugger We need to download the SoftICE, presumably the trial ...