Welcome![Sign In][Sign Up]
Location:
Search - KiFastCallEntry

Search list

[Hook apisysenter

Description: KiFastCallEntry hooking
Platform: | Size: 1024 | Author: DongHyun | Hits:

[Hook apianti-ssdt

Description: Windows XP是通过sysenter调用KiFastCallEntry将ntdll.dll的调用切换到内核的。KiFastCallEntry的原理是通过在SSDT中查找函数地址跳转。所以只要伪造一张原始SSDT,就可以使得SSDT-HOOK无效了。-Windows XP by calling KiFastCallEntry sysenter ntdll.dll call will switch to the kernel. KiFastCallEntry SSDT principle is to find the function by address jump. So long as the original forged an SSDT, you can make SSDT-HOOK invalid.
Platform: | Size: 5120 | Author: 何耀彬 | Hits:

[Driver DevelopPE

Description: 基本的驱动编程和客户端,客户端分析PE文件,重定位后,传给驱动,恢复被360 Hook的KifastCallEntry函数,同时,该源码还能实现对大多数安全软件进行强杀,如卡巴,360,瑞星,等等。仅限XP系统。-Basic programming and client-driven, client-side analysis PE file, re-positioning, passing drivers, restore 360 Hook' s KifastCallEntry function at the same time, the source also enables the strong to kill the majority of security software, such as carbachol, 360, Rising, and so on. Only XP.
Platform: | Size: 2528256 | Author: zzz | Hits:

[Hook apiKiFastCallEntry

Description: 挂钩KiFastCallEntry保护进程的代码,做了自旋锁,保证了多核环境安全-Linked KiFastCallEntry protection process code, so the spin lock to ensure safety of multi-core environment
Platform: | Size: 358400 | Author: hyutu | Hits:

[Driver DevelopOverloaded-kernel-file-to-bypass-the-SSDT

Description: Hook KiFastCallEntry
Platform: | Size: 212992 | Author: Blue | Hits:

[Hook apiHook-KiFastCallEntry

Description: Hook KiFastCallEntry监控系统调用 这是一个监控特定进程系统调用的小程序,整理硬盘时找到的,发出来跟大家分享。原理很简单,通过hook KiFastCallEntry实现,很老的技术了。-The monitoring system Hook KiFastCallEntry call this is a small program to monitor specific process system calls, finishing hard disk when you find the issue to share with you. The principle is very simple, by hook KiFastCallEntry achieve very old technology.
Platform: | Size: 176128 | Author: ljh | Hits:

[Hook apipath-KiFastCallEntry

Description: 1.加载内核 2.修正镜像 3.内核重定位 4 与修正sdt -源语言: 中文目标语言: 英语翻译点击有惊喜,“我喜欢你” 用粤语怎么说?来听听“不知道”用粤语怎么说?点击试试 “做人呢,最重要的就是开心” 的粤语发音想知道“鱼丸粗面”用粤语怎么说吗?小伙伴们快来试试粤语翻译,点击:你饿不饿?我去煮碗面给你吃 源语言: 中文目标语言: 英语翻译点击有惊喜,“我喜欢你” 用粤语怎么说?来听听“不知道”用粤语怎么说?点击试试 “做人呢,最重要的就是开心” 的粤语发音想知道“鱼丸粗面”用粤语怎么说吗?小伙伴们快来试试粤语翻译,点击:你饿不饿?我去煮碗面给你吃 1> load the kernel 2>path KiFastCallEntry redirection
Platform: | Size: 30720 | Author: 徐传松 | Hits:

[OS programKiFastCallEntry

Description: SSDT HOOK,学习inline hook等相关的技术原理,非常值得参考。-Technical principles related SSDT HOOK, learning inline hook so very worth considering.
Platform: | Size: 352256 | Author: sky | Hits:

[Driver Developdriver

Description: 1:将内核文件映射到我内核空间去; 2:path KiFastCallEntry重定向 一:加载内核 1:关于加载 我代码里用了两种方法,一种被我注释了的: a:使用ZwCreateSection + ZwMapVieOfSection 结合 SEC_IMAGE 标志来加载,此时加载的地址必定是位于user-mode空间,可以简单的用MDL锁定,然后映射这些页面到kernel-mode空间,也可以直接ExAllocatePool 然后 copy加载的镜像 b : 直接ReadFile啦,对PE格式了解点点,很简单的,不多说,看代码吧 2:关于修正镜像 1:重定位 这个是必须的,但是要注意,必须以原先系统的内核为基址重定位,因为你想自己初始化一些东西如对象头,调度链之类的已经不可能了,你必须让新内核的数据指向老内核 2:修正SDT 这个不需要多说,算算RVA,四则运算一做就好啦-1: to map the kernel file to my kernel space to 2: path KiFastCallEntry redirection
Platform: | Size: 30720 | Author: www | Hits:

CodeBus www.codebus.net