Moved from d0cs4vage.blogspot.com to here
This post is going to cover three levels of usefulness of windbg instrumentation via javascript : subpar, normal, and abnormal.
SUBPAR Link to heading
The most basic way of instrumenting windbg via javascript is to set a
breakpoint on a simple function, such as Math.atan, call Math.atan at the
appropriate time in javascript to force windbg to break, and then do whatever
you need to do in windbg. Useful, yes, but it’s lame and gets extremely
tiring after the first time of doing it.
NORMAL Link to heading
A better way to instrument windbg via javascript is to create a way for javascript to print a message in windbg (and trigger a break):
bu jscript!Js::Math::Atan ".printf \"DEBUG: %mu\\n\", poi(poi(esp+10)+c) ; g"
(If you want to break, remove the ; g)
That’s cool, but what if you want to do something a little more complicated, like track all allocations of a specific size after certain javascript statements have been executed. With the previous method, the javascript would have to look something like this:
function log(msg) {
Math.atan(msg);
}
function track_all_allocations_and_frees_size_x20() {
Math.asin();
}
log("Executing main javascript");
execute_main_javascript();
log("Track all allocations and frees now");
track_all_allocations_and_frees_size_x20();
do_something_cool();
… and the windbg breakpoints would be something like this:
bu jscript!Js::Math::Atan ".printf \"DEBUG: %mu\\n\", poi(poi(esp+10)+c) ; g"
bu jscript!Js::Math::Asin "bp ntdll!RtlAllocateHeap .if(poi(esp+c) == 0x20) { .echo ALLOCATED ONE ; knL } ; g"
This is more useful, but is still very inflexible. For every new javascript<–>windbg binding you might want, you’d need to also modify your breakpoints in windbg.
ABNORMAL Link to heading
Below is an abnormally useful way to instrument windbg with javascript:
bu jscript!Js::Math::Atan ".block { .shell -ci \".printf \\\"%mu\\\\n\\\", poi(poi(esp+10)+c)\" find /v \"13333333337\" > cmd_to_exec.txt & exit } ; $><cmd_to_exec.txt"
This lets you execute windbg commands directly from javascript. The breakpoint
basically does an eval("WINDBG_CMD") with a string from memory. Broken down,
the breakpoint goes like this:
.block {
.shell -ci ".printf \"%mu\\n\", poi(poi(esp+10)+c)" find /v \"13333333337\" > cmd_to_exec.txt
}
$<>cmd_to_exec.txt