View Single Post
  #2  
Old 03-20-2022, 00:43
pp2 pp2 is offline
Friend
 
Join Date: Jan 2002
Posts: 55
Rept. Given: 1
Rept. Rcvd 2 Times in 2 Posts
Thanks Given: 0
Thanks Rcvd at 15 Times in 11 Posts
pp2 Reputation: 2
You cannot debug or step into kernel calls, like syscall's using just x32dbg, x64dbg or any other pure userspace debugger. Use windbg in live (kernel) mode instead, if you need to see what's happening in this syscall. But even with windbg you cannot step into syscall, but just set conditional breakpoint on syscall handler (can be obtained by reading MSRs) with EAX==0xE5.
Reply With Quote
The Following 2 Users Say Thank You to pp2 For This Useful Post:
sh3dow (03-21-2022), squareD (03-20-2022)