首页
社区
课程
招聘
[分享]NP的hook检测工具,
2008-2-15 21:54 14157

[分享]NP的hook检测工具,

2008-2-15 21:54
14157
上次看到牛人,检测了NP的hook.
最近在 写驱动时候,看到了几个工具,能用,用来检测内核级的,hook

RkU3.7.300.503.zip
http://bbs.driverdevelop.com/job.php?action=download&pid=&tid=100947&aid=18614

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
点赞0
打赏
分享
最新回复 (11)
雪    币: 356
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
stupidass 2008-2-18 12:53
2
0
1059版本的NP与该工具不兼容。
雪    币: 356
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
stupidass 2008-2-18 12:57
3
0
改造一下可以用。写个工具禁止R3邪恶模块注入检测工具进程。驱动层需要稍微做点改动。
雪    币: 356
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
stupidass 2008-2-18 12:59
4
0
只能检测SSDT钩子,对于NP的inlinehook无法检测出来。
雪    币: 141
活跃值: (23)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
speeches 2008-2-18 16:25
5
0
别人的,不是我造的,还没这功力
雪    币: 196
活跃值: (1048)
能力值: ( LV6,RANK:90 )
在线值:
发帖
回帖
粉丝
poppig 2 2008-2-18 17:15
6
0
>Hooks
ntfs.sys-->ntkrnlpa.exe-->IoCreateDevice, Type: IAT modification at address 0xF2670C8C hook handler located in [unknown_code_page]
ntkrnlpa.exe+0x00020174, Type: Inline - RelativeJump at address 0x804F8174 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe+0x00020438, Type: Inline - RelativeJump at address 0x804F8438 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->FsRtlCheckLockForReadAccess, Type: Inline - RelativeJump at address 0x804EAE14 hook handler located in [klif.sys]
ntkrnlpa.exe-->IoCreateDevice, Type: EAT modification at address 0x80663770 hook handler located in [unknown_code_page]
ntkrnlpa.exe-->IoIsOperationSynchronous, Type: Inline - RelativeJump at address 0x804EF54E hook handler located in [klif.sys]
ntkrnlpa.exe-->KeAttachProcess, Type: Inline - RelativeJump at address 0x804F853C hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->KeStackAttachProcess, Type: Inline - RelativeJump at address 0x804F8638 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtDeviceIoControlFile, Type: Inline - RelativeJump at address 0x8056E2FC hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtOpenProcess, Type: Inline - RelativeJump at address 0x805C0B56 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtOpenSection, Type: Inline - RelativeJump at address 0x8059F258 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtProtectVirtualMemory, Type: Inline - RelativeJump at address 0x805AD4C6 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtReadVirtualMemory, Type: Inline - RelativeJump at address 0x805A91D0 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtWriteFile, Type: Inline - RelativeJump at address 0x805720A0 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtWriteVirtualMemory, Type: Inline - RelativeJump at address 0x805A92DA hook handler located in [dump_wmimmc.sys]
雪    币: 202
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
luolinlove 2008-2-19 00:18
7
0
看不懂,还是去看看初级教程。
雪    币: 100
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
灵火 2008-2-20 14:13
8
0
看不懂,还是去看看初级教程。
雪    币: 38
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
xihuanxue 2008-2-22 17:39
9
0
driverdevelop注册不上 谁上传个上来  谢谢
雪    币: 215
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
NINEIN 2008-2-22 22:55
10
0
那块有不初级教程呀。没找到呀。能给个链接吗
雪    币: 85452
活跃值: (198780)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
linhanshi 2008-2-23 01:26
11
0
Down it.
上传的附件:
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
anthor 2008-2-24 01:35
12
0
请问下NP坚定到我的UCE(undetected cheat engine)..
怎样找出哪个字串被坚定到呢??
游客
登录 | 注册 方可回帖
返回