Objectives:
To begin getting familiar with the debug kernel
To learn how to identify the API targeted by a call gate
To learn about getting control when a module is loaded
To learn how to find the TSS
To learn how to find privileged stacks
Look at the ring 3 stack before
Actually execute a far call from ring 3 to ring 0.
Look at both stacks afterwards.