Blog home Search
logologoGo to homepage
  • Technology
  • Features
  • Demos
  • Pricing
  • Resources
    • Helpdesk & FAQ
    • Documentation
    • Github
  • Company
    • About
    • Contact
  • Blog
Blog home Search
Subscribe to What's New Subscribe to What's New
Recent posts
  • Who corrupted the data! Get a fast and precise answer with the taint
  • REVEN OpenLab - Feb 18th, 2021
  • Detecting Buffer-Overflow vulnerabilities using REVEN
Categories
  • Reven (18)
  • Technical (18)
  • Tutorial (13)
  • Automation (2)
  • Conference (2)
  • All posts (50)
Tags
  • Axion (7)
  • Reven (43)
  • Reverse engineering (29)
  • Taint (9)
  • Use after free (1)
  • Flash (1)
  • Swf (1)
  • Reven axion (1)
  • Plugin (1)
  • Deobfuscation (3)
  • Ctf (1)
  • Ctf (2)
  • Bsod (1)
  • Kernel (2)
  • Race-condition (1)
  • Cve (9)
  • Adobe flash (1)
  • Demo (13)
  • Patchguard (1)
  • Exploit (3)
  • Windows kernel (3)
  • Scripts (1)
  • Windows boot (1)
  • Uefi (1)
  • Malware analysis (2)
  • Releases (6)
  • Announcement (6)
  • Automation (3)
  • Analysis api (7)
  • Workflow api (5)
  • Pe (1)
  • Parsing (1)
  • Pte (1)
  • Syscall (1)
  • Script (1)
  • Ossi (1)
  • Oob (1)
  • Read overflow (1)
  • Use after free (2)
  • Uaf (2)
  • Garbage collector (2)
  • Memory management (2)
  • Scenario recording (5)
  • Api (1)
  • Windbg (1)
  • Buffer overflow (2)
  • Performance (1)
  • Profiling (1)
  • Use case (1)
  • Vulnerability detection (2)
  • Use cases (1)
  • Cryptography (1)

1 post in archive

Windows boot from UEFI to kernel

20 May 2019 by Mathieu - Technical - Reverse Engineering Windows Kernel Windows boot UEFI Demo REVEN

Getting full visibility into the Windows 10 OS’ boot mechanisms is challenging. REVEN opens up a new world of possibilities with its timeless analysis technology! We used REVEN to record the Windows OS’ boot process, all the way from before the UEFI firmware transfers control to the boot process, to...

©2019 Tetrane