HyperDbg Debugger
Loading...
Searching...
No Matches
epthook.cpp File Reference

!epthook command More...

#include "pch.h"

Functions

VOID CommandEptHookHelp ()
 help of the !epthook command
 
VOID CommandEptHook (vector< string > SplitCommand, string Command)
 !epthook command handler
 

Detailed Description

!epthook command

Author
Sina Karvandi (sina@.nosp@m.hype.nosp@m.rdbg..nosp@m.org)
Version
0.1
Date
2020-07-10

Function Documentation

◆ CommandEptHook()

VOID CommandEptHook ( vector< string > SplitCommand,
string Command )

!epthook command handler

Parameters
SplitCommand
Command
Returns
VOID
48{
50 PDEBUGGER_GENERAL_ACTION ActionBreakToDebugger = NULL;
51 PDEBUGGER_GENERAL_ACTION ActionCustomCode = NULL;
52 PDEBUGGER_GENERAL_ACTION ActionScript = NULL;
53 UINT32 EventLength;
54 UINT32 ActionBreakToDebuggerLength = 0;
55 UINT32 ActionCustomCodeLength = 0;
56 UINT32 ActionScriptLength = 0;
57 BOOLEAN GetAddress = FALSE;
58 UINT64 OptionalParam1 = 0; // Set the target address
59 vector<string> SplitCommandCaseSensitive {Split(Command, ' ')};
60 UINT32 IndexInCommandCaseSensitive = 0;
61 DEBUGGER_EVENT_PARSING_ERROR_CAUSE EventParsingErrorCause;
62
63 if (SplitCommand.size() < 2)
64 {
65 ShowMessages("incorrect use of the '!epthook'\n");
67 return;
68 }
69
70 //
71 // Interpret and fill the general event and action fields
72 //
74 &SplitCommand,
75 &SplitCommandCaseSensitive,
77 &Event,
78 &EventLength,
79 &ActionBreakToDebugger,
80 &ActionBreakToDebuggerLength,
81 &ActionCustomCode,
82 &ActionCustomCodeLength,
83 &ActionScript,
84 &ActionScriptLength,
85 &EventParsingErrorCause))
86 {
87 return;
88 }
89
90 //
91 // Check here to make sure that the user didn't specified the calling stages for this ept hook
92 //
94 {
95 ShowMessages("the utilization of 'post' or 'all' event calling stages is not meaningful "
96 "for the hidden hook; therefore, this command does not support them\n");
97
98 FreeEventsAndActionsMemory(Event, ActionBreakToDebugger, ActionCustomCode, ActionScript);
99 return;
100 }
101
102 //
103 // Interpret command specific details (if any)
104 //
105 for (auto Section : SplitCommand)
106 {
107 IndexInCommandCaseSensitive++;
108
109 if (!Section.compare("!epthook"))
110 {
111 continue;
112 }
113 else if (!GetAddress)
114 {
115 //
116 // It's probably address
117 //
119 SplitCommandCaseSensitive.at(IndexInCommandCaseSensitive - 1),
120 &OptionalParam1))
121 {
122 //
123 // Couldn't resolve or unknown parameter
124 //
125 ShowMessages("err, couldn't resolve error at '%s'\n\n",
126 SplitCommandCaseSensitive.at(IndexInCommandCaseSensitive - 1).c_str());
128
129 FreeEventsAndActionsMemory(Event, ActionBreakToDebugger, ActionCustomCode, ActionScript);
130 return;
131 }
132 else
133 {
134 GetAddress = TRUE;
135 }
136 }
137 else
138 {
139 //
140 // Unknown parameter
141 //
142 ShowMessages("unknown parameter '%s'\n\n", Section.c_str());
144
145 FreeEventsAndActionsMemory(Event, ActionBreakToDebugger, ActionCustomCode, ActionScript);
146 return;
147 }
148 }
149 if (OptionalParam1 == 0)
150 {
151 ShowMessages("please choose an address to put the hidden breakpoint on it\n");
152
153 FreeEventsAndActionsMemory(Event, ActionBreakToDebugger, ActionCustomCode, ActionScript);
154 return;
155 }
156
157 //
158 // Set the optional parameters
159 //
160 Event->Options.OptionalParam1 = OptionalParam1;
161
162 //
163 // Send the ioctl to the kernel for event registration
164 //
165 if (!SendEventToKernel(Event, EventLength))
166 {
167 //
168 // There was an error, probably the handle was not initialized
169 // we have to free the Action before exit, it is because, we
170 // already freed the Event and string buffers
171 //
172
173 FreeEventsAndActionsMemory(Event, ActionBreakToDebugger, ActionCustomCode, ActionScript);
174 return;
175 }
176
177 //
178 // Add the event to the kernel
179 //
180 if (!RegisterActionToEvent(Event,
181 ActionBreakToDebugger,
182 ActionBreakToDebuggerLength,
183 ActionCustomCode,
184 ActionCustomCodeLength,
185 ActionScript,
186 ActionScriptLength))
187 {
188 //
189 // There was an error
190 //
191
192 FreeEventsAndActionsMemory(Event, ActionBreakToDebugger, ActionCustomCode, ActionScript);
193 return;
194 }
195}
UCHAR BOOLEAN
Definition BasicTypes.h:39
#define TRUE
Definition BasicTypes.h:55
#define FALSE
Definition BasicTypes.h:54
unsigned __int64 UINT64
Definition BasicTypes.h:21
unsigned int UINT32
Definition BasicTypes.h:48
@ VMM_CALLBACK_CALLING_STAGE_PRE_EVENT_EMULATION
Definition DataTypes.h:93
const vector< string > Split(const string &s, const char &c)
general split command
Definition common.cpp:117
VOID FreeEventsAndActionsMemory(PDEBUGGER_GENERAL_EVENT_DETAIL Event, PDEBUGGER_GENERAL_ACTION ActionBreakToDebugger, PDEBUGGER_GENERAL_ACTION ActionCustomCode, PDEBUGGER_GENERAL_ACTION ActionScript)
Deallocate buffers relating to events and actions.
Definition debugger.cpp:2292
BOOLEAN InterpretGeneralEventAndActionsFields(vector< string > *SplitCommand, vector< string > *SplitCommandCaseSensitive, VMM_EVENT_TYPE_ENUM EventType, PDEBUGGER_GENERAL_EVENT_DETAIL *EventDetailsToFill, PUINT32 EventBufferLength, PDEBUGGER_GENERAL_ACTION *ActionDetailsToFillBreakToDebugger, PUINT32 ActionBufferLengthBreakToDebugger, PDEBUGGER_GENERAL_ACTION *ActionDetailsToFillCustomCode, PUINT32 ActionBufferLengthCustomCode, PDEBUGGER_GENERAL_ACTION *ActionDetailsToFillScript, PUINT32 ActionBufferLengthScript, PDEBUGGER_EVENT_PARSING_ERROR_CAUSE ReasonForErrorInParsing)
Interpret general event fields.
Definition debugger.cpp:2342
BOOLEAN SendEventToKernel(PDEBUGGER_GENERAL_EVENT_DETAIL Event, UINT32 EventBufferLength)
Register the event to the kernel.
Definition debugger.cpp:1969
BOOLEAN RegisterActionToEvent(PDEBUGGER_GENERAL_EVENT_DETAIL Event, PDEBUGGER_GENERAL_ACTION ActionBreakToDebugger, UINT32 ActionBreakToDebuggerLength, PDEBUGGER_GENERAL_ACTION ActionCustomCode, UINT32 ActionCustomCodeLength, PDEBUGGER_GENERAL_ACTION ActionScript, UINT32 ActionScriptLength)
Register the action to the event.
Definition debugger.cpp:2086
VOID CommandEptHookHelp()
help of the !epthook command
Definition epthook.cpp:20
@ HIDDEN_HOOK_EXEC_CC
Definition Events.h:112
enum _DEBUGGER_EVENT_PARSING_ERROR_CAUSE DEBUGGER_EVENT_PARSING_ERROR_CAUSE
Reason for error in parsing commands.
VOID ShowMessages(const char *Fmt,...)
Show messages.
Definition libhyperdbg.cpp:96
NULL()
Definition test-case-generator.py:530
UINT64 OptionalParam1
Definition Events.h:272
Each event can have multiple actions.
Definition Events.h:406
Each command is like the following struct, it also used for tracing works in user mode and sending it...
Definition Events.h:350
DEBUGGER_EVENT_OPTIONS Options
Definition Events.h:391
VMM_CALLBACK_EVENT_CALLING_STAGE_TYPE EventStage
Definition Events.h:369
BOOLEAN SymbolConvertNameOrExprToAddress(const string &TextToConvert, PUINT64 Result)
check and convert string to a 64 bit unsigned integer and also check for symbol object names and eval...
Definition symbol.cpp:360

◆ CommandEptHookHelp()

VOID CommandEptHookHelp ( )

help of the !epthook command

Returns
VOID
21{
22 ShowMessages("!epthook : puts a hidden-hook EPT (hidden breakpoints).\n\n");
23
25 "syntax : \t!epthook [Address (hex)] [pid ProcessId (hex)] [core CoreId (hex)] "
26 "[imm IsImmediate (yesno)] [buffer PreAllocatedBuffer (hex)] [script { Script (string) }] "
27 "[asm condition { Condition (assembly/hex) }] [asm code { Code (assembly/hex) }] [output {OutputName (string)}]\n");
28
29 ShowMessages("\n");
30 ShowMessages("\t\te.g : !epthook nt!ExAllocatePoolWithTag\n");
31 ShowMessages("\t\te.g : !epthook nt!ExAllocatePoolWithTag+5\n");
32 ShowMessages("\t\te.g : !epthook fffff801deadb000\n");
33 ShowMessages("\t\te.g : !epthook fffff801deadb000 pid 400\n");
34 ShowMessages("\t\te.g : !epthook fffff801deadb000 core 2 pid 400\n");
35 ShowMessages("\t\te.g : !epthook fffff801deadb000 script { printf(\"hook triggered at: %%llx\\n\", $context); }\n");
36 ShowMessages("\t\te.g : !epthook fffff801deadb000 asm code { nop; nop; nop }\n");
37}