Warden: Difference between revisions
Jump to navigation
Jump to search
(New page: ===Current methods of attack=== *Hashing module names *Hashing regions of memory '''Offset Size''' 0x420541 0xA 0x48A2CC 0x6 0x48A2F0 0x5 0x48D4A0 0xC 0x490430 0xC 0x49DBB2 0x7 0x...) |
No edit summary |
||
Line 28: | Line 28: | ||
**OoOoOoooo0oOO | **OoOoOoooo0oOO | ||
**BG_DESERTER | **BG_DESERTER | ||
===Exploits=== | |||
Some exploits i'm willing to make public are: | |||
*VirtualQuery - Hooking VirtualQuery, you can prevent Warden from reading data from your module. | |||
*Module32First/Next - You can either use these API to hide your module. | |||
**An alternative to this is just to remove your module from the PEB linked list. |
Revision as of 05:18, 1 September 2008
Current methods of attack
- Hashing module names
- Hashing regions of memory
Offset Size 0x420541 0xA 0x48A2CC 0x6 0x48A2F0 0x5 0x48D4A0 0xC 0x490430 0xC 0x49DBB2 0x7 0x4AA9C2 0x5 0x5CDC20 0x6 0x61535A 0x9 0x681778 0x5 0x7B9D42 0x6 0x7BAA98 0xC 0x8C8398 0x8 0x8C845C 0x8 0x8F7AC8 0x8 0xB93714 0x8
- Hashing relative offsets in modules/sections
- Hashing driver names
- IPSect
- Afde32u
- Afde32uu
- HideEx
- Determining if certain LUA strings are loaded
- OoOoOoooo0oOO
- BG_DESERTER
Exploits
Some exploits i'm willing to make public are:
- VirtualQuery - Hooking VirtualQuery, you can prevent Warden from reading data from your module.
- Module32First/Next - You can either use these API to hide your module.
- An alternative to this is just to remove your module from the PEB linked list.