Professional Documents
Culture Documents
!Exploitablecrashanalyzerversion1.6|CyberTrustBlog
!Exploitable crash
analyzer version 1.6
June 13, 2013 - SDL Team - Trustworthy Computing, Microsoft
OnWednesdayMay1st,!Exploitablecrashanalyzerversion1.6became
available.Sourcecodeandbinariescanbefoundat
https://msecdbg.codeplex.com/.
Forthosewhomaybeunfamiliarwiththetool,!Exploitable(pronouncedbang
exploitable)isaWindowsdebuggingextension(Windbg)thatprovides
automatedcrashanalysisandsecurityriskassessment.Itsprimaryuseisin
evaluatingcrashesfoundbyfuzzing.
Thefirstnewfeatureinvolveschangestothestackhashingportionof
!Exploitable.!Exploitableprovidestwohashesofthestackatthepointofthe
crash.Oneimportantpartofcreatingthehashesisdeterminingifaspecific
frameofthestackshould,orshouldnotbeincludedinthehashcalculation.By
default!Exploitableusesasetofpatternstofilteroutstackframeswhichare
usedinprocessingexceptions,providingclrfunctionality,orareOSresource
functions.!Exploitable1.6allowsthislisttobeextendedviaaconfigurationfile.
Thisallowsteamstofilteroutpartsofthestacktheyspecificallydonotcare
about,resultinginhashesthataremorerelevanttothem.
Thesecondnewfeatureissupportforprocessingcrashdumpfilesfrom
WindowsRT.Thismeans!ExploitablehasaworkingknowledgeofARM
assemblyandcantranslatetheARMinstructionsintoitsmetaassembly,allow
https://blogs.microsoft.com/cybertrust/2013/06/13/exploitablecrashanalyzerversion16/
1/4
16/10/2015
!Exploitablecrashanalyzerversion1.6|CyberTrustBlog
forthecurrentrulestobeapplied.
Tolearnmoreabout!Exploitablepleasevisithttps://msecdbg.codeplex.com/.
Questionsandcommentscanbeleftinthediscussionssection
https://msecdbg.codeplex.com/discussions.
AndyRenk
MicrosoftSecurityEngineeringCenter
SDL Team
Featured Posts
Cloud security controls series: OneDrive for Business
One of the Microsoft cloud services that I get asked Read more
Most Popular
Positive steps on the road towards harmonization of global cybersecurity risk
management frameworks
Guest Blogger: Jan Neutze, Director of Cybersecurity Policy, Europe/Middle East/Africa Read more
https://blogs.microsoft.com/cybertrust/2013/06/13/exploitablecrashanalyzerversion16/
2/4
16/10/2015
!Exploitablecrashanalyzerversion1.6|CyberTrustBlog
Tags
application security
security development
security tools
Share this post:
Related Stories
Phishers Targeting
Growing Mobile User Base
and Online Services
We recently published volume 15
of the Microsoft Security
Intelligence Report. This volume
of the Read more
Corporate Blogs
Corporate Citizenship Blog
Internet of Things
Cyber Trust Blog
Microsoft on the Issues
Next at Microsoft
Official Microsoft Blog
The Fire Hose
Windows
Windows Blogs
Office
Office Blogs
https://blogs.microsoft.com/cybertrust/2013/06/13/exploitablecrashanalyzerversion16/
3/4
16/10/2015
!Exploitablecrashanalyzerversion1.6|CyberTrustBlog
Devices
Surface Blog
Xbox Wire
Conversations
Services
Skype Blogs
Bing Blogs
Contact Us
Terms of Use
Trademarks
https://blogs.microsoft.com/cybertrust/2013/06/13/exploitablecrashanalyzerversion16/
4/4