HyperDbg Debugger
|
Implementation of functions to find SSDT entries for SSDT Hook. More...
#include "pch.h"
Functions | |
PVOID | SyscallHookGetKernelBase (PULONG ImageSize) |
Get the kernel base and Image size. | |
BOOLEAN | SyscallHookFindSsdt (PUINT64 NtTable, PUINT64 Win32kTable) |
Find SSDT address of Nt functions and W32Table. | |
PVOID | SyscallHookGetFunctionAddress (INT32 ApiNumber, BOOLEAN GetFromWin32k) |
Find entry from SSDT table of Nt functions and W32Table syscalls. | |
NTSTATUS | NtCreateFileHook (PHANDLE FileHandle, ACCESS_MASK DesiredAccess, POBJECT_ATTRIBUTES ObjectAttributes, PIO_STATUS_BLOCK IoStatusBlock, PLARGE_INTEGER AllocationSize, ULONG FileAttributes, ULONG ShareAccess, ULONG CreateDisposition, ULONG CreateOptions, PVOID EaBuffer, ULONG EaLength) |
Hook function that hooks NtCreateFile. | |
VOID | SyscallHookTest () |
Make examples for testing hidden hooks. | |
Implementation of functions to find SSDT entries for SSDT Hook.
NTSTATUS NtCreateFileHook | ( | PHANDLE | FileHandle, |
ACCESS_MASK | DesiredAccess, | ||
POBJECT_ATTRIBUTES | ObjectAttributes, | ||
PIO_STATUS_BLOCK | IoStatusBlock, | ||
PLARGE_INTEGER | AllocationSize, | ||
ULONG | FileAttributes, | ||
ULONG | ShareAccess, | ||
ULONG | CreateDisposition, | ||
ULONG | CreateOptions, | ||
PVOID | EaBuffer, | ||
ULONG | EaLength ) |
Hook function that hooks NtCreateFile.
FileHandle | |
DesiredAccess | |
ObjectAttributes | |
IoStatusBlock | |
AllocationSize | |
FileAttributes | |
ShareAccess | |
CreateDisposition | |
CreateOptions | |
EaBuffer | |
EaLength |
Find SSDT address of Nt functions and W32Table.
NtTable | [Out] Address of Nt Syscall Table |
Win32kTable | [Out] Address of Win32k Syscall Table |
Find entry from SSDT table of Nt functions and W32Table syscalls.
ApiNumber | The Syscall Number |
GetFromWin32k | Is this syscall from Win32K |
PVOID SyscallHookGetKernelBase | ( | PULONG | ImageSize | ) |
Get the kernel base and Image size.
pImageSize | [Out] Image size |
VOID SyscallHookTest | ( | ) |
Make examples for testing hidden hooks.
THIS EXAMPLE IS NOT VALID ANYMORE, PLEASE USE !syscall OR !epthook2 COMMANDS