From 83d36b43d590c14132ecf2dd451de261181f55e5 Mon Sep 17 00:00:00 2001 From: Paolo 'VoidSec' Stagno Date: Thu, 4 Nov 2021 09:07:58 +0100 Subject: [PATCH] updated README.MD --- README.MD | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.MD b/README.MD index 7a64d7b..b60fe6b 100644 --- a/README.MD +++ b/README.MD @@ -27,12 +27,12 @@ To use the auto-analysis feature: 2. Go to `Edit -> Plugins -> Driver Buddy Reloaded` or press `CTRL+ALT+A` to start the auto-analysis. 3. Check the "Output" window for the analysis results. -To decode an IOCTLs: +To decode an IOCTL: 1. Place the mouse cursor on the line containing a suspected IOCTL code. 2. Right-click and select `Driver Buddy Reloaded -> Decode IOCTL`; alternatively press the `CTRL+ALT+D` shortcut. -To decode ALL IOCTLs: +To decode ALL IOCTLs within a function: 1. Place the mouse cursor on the first instruction of the function you believe to be the IOCTL dispatcher ( `DispatchDeviceControl`, `DispatchInternalDeviceControl`, `Possible_DispatchDeviceControl_#`)