[LIVEKD]
Live kernel debugger for rootkit detection, kernel analysis, and advanced system-level security investigation
Expert Tool Warning
LiveKd is an extremely advanced tool that provides direct access to kernel memory and system structures. Improper use can cause system instability, crashes, or data corruption. Use only by experienced professionals in controlled environments.
Key Features
Understanding Kernel Debugging
Kernel debugging provides access to the Windows kernel's internal data structures and memory. LiveKd enables this analysis on a running system without the need for a separate debug target.
What You Can Analyze:
- • Process and thread structures
- • Device driver information
- • System service tables (SSDT)
- • Interrupt descriptor tables (IDT)
- • Memory management structures
- • Registry hive information
Security Applications:
- • Rootkit detection and analysis
- • SSDT hook detection
- • Hidden process discovery
- • Driver integrity validation
- • Kernel object manipulation detection
- • Advanced persistent threat analysis
Basic Usage
Starting LiveKd
Prerequisites
- Windows Debugging Tools: WinDbg or Debugging Tools for Windows must be installed
- Administrative Privileges: Must run as administrator for kernel access
- Symbols: Microsoft symbols should be configured for proper analysis
- System Requirements: Compatible with modern Windows versions
Rootkit Detection Techniques
Common Detection Methods
1. SSDT Hook Detection
Check System Service Descriptor Table for hooks and modifications.
2. IDT Analysis
Examine Interrupt Descriptor Table for unauthorized modifications.
3. Driver List Verification
Compare loaded drivers with legitimate system driver list.
Process Hiding Detection
Essential WinDbg Commands
Command | Description | Use Case |
---|---|---|
!process 0 0 | List all processes | Hidden process detection |
!drvobj | Display driver objects | Malicious driver detection |
!idt | Dump interrupt descriptor table | IDT hook detection |
!chkimg | Check image integrity | Kernel patching detection |
!object | Examine kernel objects | Object manipulation analysis |
!gflag | Global flags information | System configuration analysis |
!analyze -v | Automated analysis | Crash dump analysis |
Security Use Cases
🕵️ Advanced Threat Hunting
Hunt for sophisticated threats operating at kernel level.
🔍 Forensic Investigation
Deep forensic analysis of compromised systems.
🛡️ Rootkit Analysis
Detect and analyze kernel-mode rootkits and bootkits.
🧪 Malware Research
Research kernel-mode malware techniques and countermeasures.
Advanced Detection Techniques
Memory Analysis Patterns
- Kernel Pool Analysis: Examine pool allocations for suspicious patterns
- Object Reference Tracking: Follow object references to detect manipulation
- Code Integrity Verification: Compare loaded code with disk images
- System Call Tracing: Monitor system call table modifications
Automated Analysis Scripts
Limitations & Considerations
⚠️ System Impact
Kernel debugging can cause system slowdown and potential stability issues during analysis.
⚠️ Skill Requirements
Requires deep understanding of Windows kernel architecture and debugging concepts.
⚠️ Detection Limitations
Advanced rootkits may use techniques that are difficult to detect even with kernel debugging.
⚠️ Environment Dependency
Analysis results may vary based on system configuration, patches, and security software.