Create Your Own Process Explorer with the Windows API!
Viking Sec
Join the Discord to chat all things malware research and Windows OS deep diving! https://discord.gg/G9UMXm8uv3
--
In this episode of the Windows API deep dive series, we're going to talk about the all-important Windows process and how to enumerate them with the Windows API! This is super important for malware reversing and development and general OS research. I hope you enjoy, leave me a like and consider subscribing if you do!
--
Twitter: https://twitter.com/viking_sec
Windows API Playlist: https://www.youtube.com/watch?v=VnWOSWZthdo&list=PL1jK3K11NINgL0qUAszHwRhGIIyOvfUI9
Reverse-Reverse Engineering Playlist: https://www.youtube.com/watch?v=RWOahxzoGCU&list=PL1jK3K11NINhvnr7Y3iGu8eLKec72Sl7D&index=3
-- Table of Contents: 0:00 Intro 0:13 Studying the Windows API 0:30 Windows Processes 1:10 Process Memory 1:45 The importance of processes 2:10 Looking at process information 3:00 The Code 4:30 Enumerating PIDs 5:00 EnumProcesses() 5:57 PIDs 9:07 Debugging EnumProcesses() 15:00 Enumerating Process Names 18:07 Windows Handles 18:40 OpenProcess() 22:09 Windows Modules 24:07 EnumProcessModules() 27:05 GetModuleBaseName() 28:23 Code Recap 29:40 Running the code 30:00 Limitations
-- #reverseengineering #windowsos #c++ ... https://www.youtube.com/watch?v=tnMUS8cMYwQ
105665423 Bytes