Talk With an Expert

Comprehensive Kernel Debugging for Windows Developers

Comprehensive Kernel Debugging for Windows Developers (PDF, 5.19MB)Published: 06 Aug, 2025
Created by:
Jonathan Reiter
Jonathan Reiter

High-value penetration testing involves modeling the techniques used by real-world computer attackers to find vulnerabilities, and under controlled circumstances, to exploit those flaws in a professional, safe manner according to a carefully designed scope and rules of engagement. This process helps to determine business risk and potential impact of attacks, all with the goal of helping the organization improve its security stance. Here are recommendations for each phase of penetration testing to help you provide higher business value in your work.

This poster has been created as reference for the SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control course by the Certified Instructor Jonathan Reiter.

Author

Jonathan Reiter
Jonathan Reiter

Jonathan Reiter

Certified Instructor

Jonathan is an officer in the Maryland Air National Guard serving as a cyberspace capabilities developer. With expertise in Windows implant development and kernel research, he brings practical defensive and offensive cybersecurity experience to SANS.

Read more about Jonathan Reiter