Nouk
驱动中牛
驱动中牛
  • 注册日期2001-08-22
  • 最后登录2006-10-22
  • 粉丝0
  • 关注0
  • 积分0分
  • 威望0点
  • 贡献值0点
  • 好评度0点
  • 原创分0分
  • 专家分0分
阅读:971回复:1

Dynamic Call - Native Function

楼主#
更多 发布于:2002-08-13 09:45
I trace the userdump in NTDDK.
It using RtlImageNtHeader to search the NTOSKRNL spaces, to find its export functions.
Does anyone know another way?
^_^
Taiwan's Driver Developer
lyabcd
驱动大牛
驱动大牛
  • 注册日期2001-08-09
  • 最后登录2015-10-01
  • 粉丝0
  • 关注0
  • 积分33分
  • 威望4点
  • 贡献值0点
  • 好评度3点
  • 原创分0分
  • 专家分0分
沙发#
发布于:2002-08-13 10:11
NT Kernel level hooking
There are several methods for achieving hooking of NT system services in kernel mode. The most popular interception mechanism was originally demonstrated by Mark Russinovich and Bryce Cogswell in their article [3] \"Windows NT System-Call Hooking\". Their basic idea is to inject an interception mechanism for monitoring NT system calls just bellow the user mode. This technique is very powerful and provides an extremely flexible method for hooking the point that all user-mode threads pass through before they are serviced by the OS kernel.
You can find an excellent design and implementation in \"Undocumented Windows 2000 Secrets\" as well. In his great book Sven Schreiber explains how to build a kernel-level hooking framework from scratch [5].

Another comprehensive analysis and brilliant implementation has been provided by Prasad Dabak in his book \"Undocumented Windows NT\" [17].

However, all these hooking strategies, remain out of the scope of this article
引用自:

http://www.codeproject.com/system/HookSys.asp
datongguandian@sina.com
游客

返回顶部