You are on page 1of 4

16/10/2015

!Exploitablecrashanalyzerversion1.6|CyberTrustBlog

Cyber Trust Blog

!Exploitable crash
analyzer version 1.6
June 13, 2013 - SDL Team - Trustworthy Computing, Microsoft

OnWednesdayMay1st,!Exploitablecrashanalyzerversion1.6became
available.Sourcecodeandbinariescanbefoundat
https://msecdbg.codeplex.com/.
Forthosewhomaybeunfamiliarwiththetool,!Exploitable(pronouncedbang
exploitable)isaWindowsdebuggingextension(Windbg)thatprovides
automatedcrashanalysisandsecurityriskassessment.Itsprimaryuseisin
evaluatingcrashesfoundbyfuzzing.
Thefirstnewfeatureinvolveschangestothestackhashingportionof
!Exploitable.!Exploitableprovidestwohashesofthestackatthepointofthe
crash.Oneimportantpartofcreatingthehashesisdeterminingifaspecific
frameofthestackshould,orshouldnotbeincludedinthehashcalculation.By
default!Exploitableusesasetofpatternstofilteroutstackframeswhichare
usedinprocessingexceptions,providingclrfunctionality,orareOSresource
functions.!Exploitable1.6allowsthislisttobeextendedviaaconfigurationfile.
Thisallowsteamstofilteroutpartsofthestacktheyspecificallydonotcare
about,resultinginhashesthataremorerelevanttothem.
Thesecondnewfeatureissupportforprocessingcrashdumpfilesfrom
WindowsRT.Thismeans!ExploitablehasaworkingknowledgeofARM
assemblyandcantranslatetheARMinstructionsintoitsmetaassembly,allow
https://blogs.microsoft.com/cybertrust/2013/06/13/exploitablecrashanalyzerversion16/

1/4

16/10/2015

!Exploitablecrashanalyzerversion1.6|CyberTrustBlog

forthecurrentrulestobeapplied.
Tolearnmoreabout!Exploitablepleasevisithttps://msecdbg.codeplex.com/.
Questionsandcommentscanbeleftinthediscussionssection
https://msecdbg.codeplex.com/discussions.
AndyRenk
MicrosoftSecurityEngineeringCenter

About the Author

SDL Team

Trustworthy Computing, Microsoft


Back
to top

Featured Posts
Cloud security controls series: OneDrive for Business
One of the Microsoft cloud services that I get asked Read more

Cloud security controls series: Rights Management


I talk to a lot of executives about various security Read more

Cloud security controls series: Encrypting Data at Rest


In the last article I wrote in this series on Read more

Most Popular
Positive steps on the road towards harmonization of global cybersecurity risk
management frameworks
Guest Blogger: Jan Neutze, Director of Cybersecurity Policy, Europe/Middle East/Africa Read more

Dispatch from Delhi: Conference on Cyber Security and Cyber Governance

https://blogs.microsoft.com/cybertrust/2013/06/13/exploitablecrashanalyzerversion16/

2/4

16/10/2015

!Exploitablecrashanalyzerversion1.6|CyberTrustBlog

Dispatch from Delhi: Conference on Cyber Security and Cyber Governance


Guest Blogger: Aaron Kleiner Earlier this fall, I had the Read more

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World


The Internet has by and large been a cause for Read more

Tags

application security

security development

security tools
Share this post:

Related Stories
Phishers Targeting
Growing Mobile User Base
and Online Services
We recently published volume 15
of the Microsoft Security
Intelligence Report. This volume
of the Read more

FTC cracks down on phone


scammers

Microsofts Free Security


Tools Threat Modeling

This week the FTC announced a


major international crackdown on
scammers who call you on
Read more

This article in our series focused


on Microsofts free security tools
is on the Security Read more

Corporate Blogs
Corporate Citizenship Blog
Internet of Things
Cyber Trust Blog
Microsoft on the Issues
Next at Microsoft
Official Microsoft Blog
The Fire Hose

Windows
Windows Blogs

Office
Office Blogs

Business & Enterprise

https://blogs.microsoft.com/cybertrust/2013/06/13/exploitablecrashanalyzerversion16/

3/4

16/10/2015

!Exploitablecrashanalyzerversion1.6|CyberTrustBlog

Business & Enterprise


Dynamics

Devices
Surface Blog
Xbox Wire
Conversations

Services
Skype Blogs
Bing Blogs

Server & Cloud


Microsoft Azure Blog
Server & Tools Blogs

Developers & IT Pros


Developer Tools Blogs

Contact Us

Terms of Use

Trademarks

Privacy & Cookies

About our ads

2015 Microsoft Corporation. All Rights Reserved.

https://blogs.microsoft.com/cybertrust/2013/06/13/exploitablecrashanalyzerversion16/

4/4

You might also like