Hypersight Rootkit Detector monitors and intercepts the following actions classified as being potentially dangerous:
Hypersight监视和拦截以下的危险行为,大概是这个意思吧 我鸟语不行
· Attempts to modify page table. This activity is typical for ‘shadow walker’ rootkits that hide themselves in the computer memory.
尝试篡改页表,这一行为时典型的'shadow walker' rootkits在内存中隐藏自己的方式
· Attempts to modify read-only kernel modules. Most rootkits exhibit this behavior.
尝试修改只读的内核模块,大多数rootkits有这种行为
· Attempts to modify GDT and IDT. Typical for ‘shadow walker’ and other rootkits.
尝试修改GDT/IDT,'shadow walker'和其他rootkits的典型特征
然后又说内存写保护的东西
Rootkits are performing the following activities to circumvent memory write-protection:
rootkits用一下的方式绕过内存写保护
· Resetting write-protection bit (CR0.WP)
重置CR0的WP位
· Mapping memory sections with write privileges (calls to MmMapLockedPages, MmMapLockedPagesSpecifyCache)
以写权限映射内存
· Accessing physical system memory via \Device\PhysicalDrive object
访问物理内存对象
Hypersight Rootkit Detector kernel intercepts all attempts to circumvent memory write-protection
Hypersight Rootkit Detector 内核拦截一些尝试绕过内存写保护的行为。