After enumerating a list of loaded modules, it's only fitting to get started with what normally comes next, parsing exports of a DLL. Before we can do that, we will have to understand the anatomy of executable images. This means parsing PE headers. It would be great to have the following programs installed before this Part 6: WinDbg, PE Explorer by Pavel.
PS: don't forget your files from Part 5; you'll need them!
Support during the workshop will be offered in the SANS Offensive Ops Discord here.
Join the #sans-workshop channel here.