Reader small image

You're reading from  Windows APT Warfare

Product typeBook
Published inMar 2023
Reading LevelIntermediate
PublisherPackt
ISBN-139781804618110
Edition1st Edition
Languages
Tools
Right arrow
Author (1)
Sheng-Hao Ma
Sheng-Hao Ma
author image
Sheng-Hao Ma

Sheng-Hao Ma is currently working as a threat researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. He has served as a speaker and instructor for various international conferences and organizations such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education.
Read more about Sheng-Hao Ma

Right arrow

Process Environment Block

One of the main topics of this book is the PEB structure. Figure 3.6 shows some contents of the PEB structure, but for the sake of brevity, only the main points are included. The complete structure can be found in the unpublished Process-Environment-Block (https://www.aldeid.com/wiki/PEB-Process-Environment-Block) listed on the ALDEID website:

Figure 3.6 – PEB structure

Figure 3.6 – PEB structure

Figure 3.6 lists the only status information block for the current process. It holds information such as BeingDebugged at +0x02, which is the value returned internally by the developer when using WINAPI IsDebuggerPresent to check whether it is being debugged. ImageBaseAddress at +0x08, which appeared earlier in the process hollowing technique, is used to record which EXE file is the main PE module of the current process.

ProcessParameters at +0x10 in the 32-bit PEB structure records information about the parameters inherited by the current process when...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Windows APT Warfare
Published in: Mar 2023Publisher: PacktISBN-13: 9781804618110

Author (1)

author image
Sheng-Hao Ma

Sheng-Hao Ma is currently working as a threat researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. He has served as a speaker and instructor for various international conferences and organizations such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education.
Read more about Sheng-Hao Ma