Windows Bigpools

PoolTag is a 4 bytes value (unsigned int value) present in the header (i.e. POOL_HEADER) .Microsoft creates pool tag mostly for debugging purposes. So, whenever Kernel creates any object in pool memory, it creates a POOL_HEADER which contains a PoolTag field which contains information regarding what kind of object is being created. 0: kd> dt nt!_POOL_HEADER +0x000 PreviousSize : Pos 0, 8 Bits +0x000 PoolIndex : Pos 8, 8 Bits +0x002 BlockSize : Pos 0, 8 Bits +0x002 PoolType : Pos 8, 8 Bits +0x000 Ulong1 : Uint4B +0x004 PoolTag : Uint4B +0x008 ProcessBilled : Ptr64 _EPROCESS +0x008 AllocatorBackTraceIndex : Uint2B +0x00a PoolTagHash : Uint2B Let’s look at one of the running process, how it actually looks like ...

May 30, 2025 · 6 min · 5h4rrk

Windows Objects: Structure, Headers, and Internal Mechanics

A deep dive into Windows objects, focusing on their structure, headers, and relationships. This blog covers key components like _OBJECT_HEADER, OBJECT_TYPE, and ObTypeIndexTable, providing insights into how Windows organizes and references objects.

March 12, 2025 · 15 min · 5h4rrk

Windows Shellcode Development & Debugging with WinDbg: A Hands-On Guide (Part 2)

A comprehensive guide to understanding and creating Windows shellcode from scratch for exploit development. This article includes practical insights into using WinDbg for effective debugging and analysis.

January 21, 2025 · 8 min · 5h4rrk

Windows Shellcode Development & Debugging with WinDbg: A Hands-On Guide (Part 1)

A comprehensive guide to understanding and creating Windows shellcode from scratch for exploit development. This article includes practical insights into using WinDbg for effective debugging and analysis.

January 12, 2025 · 6 min · 5h4rrk

PE Parsing: A Step-by-Step Guide with WinDbg - Part 2

Hands on parsing PE files with WinDbg and explore their structures for debugging and reverse engineering.

January 12, 2025 · 11 min · 5h4rrk

PE Parsing: A Step-by-Step Guide with WinDbg - Part 1

Hands on parsing PE files with WinDbg and explore their structures for debugging and reverse engineering.

January 11, 2025 · 12 min · 5h4rrk