Using WinDbg Episode 1 - Solve a real-world high CPU issue on an Active Directory Domain Controller

Тәжірибелік нұсқаулар және стиль

Folks kept asking me for publicly-available learning material on how to get started with WinDbg.
Follow me on Twitter @JosephRyanRies

Пікірлер: 15

  • @lochlanspeck
    @lochlanspeck Жыл бұрын

    Highly enjoyable - would def like to see more videos like this, where one learns not only about debugging, but also a lot about how Windows is "put together". Thanks Ryan!

  • @ryanries09

    @ryanries09

    Жыл бұрын

    Thank you, glad you found it useful!

  • @habeebcharm8432
    @habeebcharm8432 Жыл бұрын

    Hi You have saved my day at work in finding the root cause of my issue through User Dumps... Kudos to your work and continue the same ... Thank u so much...

  • @ryanries09

    @ryanries09

    Жыл бұрын

    Nice, glad it was helpful, thanks for watching!

  • @ianmartineau4661
    @ianmartineau46612 жыл бұрын

    First time watching a debugging session. Very nice knowledge gain for an admin. Will continue watching the other episodes. Thanks.

  • @hackfans8143
    @hackfans8143 Жыл бұрын

    awsome video

  • @CH33S3BALL4U
    @CH33S3BALL4U3 жыл бұрын

    Good vod Ryan

  • @ryanries09

    @ryanries09

    3 жыл бұрын

    Thanks for watching Joe!

  • @thehouse2620
    @thehouse26202 жыл бұрын

    very useful for getting to know windbg preview. i took notes and plan to try some of these commands on our own 3rd party software. Is there anyway to see how much time threads were taking to complete?

  • @jasonbender2748
    @jasonbender27483 жыл бұрын

    As soon as you ran !us for lsass I saw the getDC call and dns client call. Why would we need to go off box if we are a DC unless we didn’t find what we were looking for. Being KDC stack I figured it was either bad password being forwarded up to PDC for password verification or the winRM group call failed.

  • @ryanries09

    @ryanries09

    3 жыл бұрын

    Bingo. We went searching our trusted domains only because we didn't find the group locally. You're right. :)

  • @Lucas-dq9wf
    @Lucas-dq9wf3 жыл бұрын

    I really like this serie ! Thanks ! I have a question: Is there a way for us to determine what name the DNSAPI!DnsQuery tries to resolve ? Is this possible without private symbols ? timecode: 1:05:41

  • @ryanries09

    @ryanries09

    3 жыл бұрын

    Yes, it would have been a lot more obvious with private symbols, but even with public symbols and a little bit of creativity and power of inference you can search the contents of those CPU registers at the stack frames where we're doing the DNS query -- it was the DNS name for one of the trusted domains. Because the DC was searching its trusted domains for that security group since the security group didn't exist in the local domain. I had to sort of skim around it though, I couldn't actually show the DNS name because I couldn't let you see it.

  • @SemeshkoV
    @SemeshkoV3 жыл бұрын

    How did you go about resolving or handling the suspected malware issue?

  • @ryanries09

    @ryanries09

    3 жыл бұрын

    Turns out it was not suspected malware, it was "legitmate" security software (Stealthbits) that could have been mistaken for malware, because it was acting like malware. Even though it wasn't malware in the end. The customer could keep using the 3rd party software as it wasn't ultimately responsible for the high CPU usage, even though I did make it known that I found the software offensive in the way it was patching internal Microsoft functions.

Келесі