Using WinDbg for Exploit Development Notes The following are some notes that I found useful when using windbg for exploit development. Setting up the symbols! 0:001> .sympath SRV*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*http://msdl.microsoft.com/download/symbols Expanded Symbol search path is: srv*http://msdl.microsoft.com/download/symbols 0:011> .reload Reloading curr