Login Register






Thread Rating:
  • 0 Vote(s) - 0 Average


Detect API hooking filter_list
Author
Message
Detect API hooking #1
Hey, so recently I have been wondering how to detect API hooking to aid prevent cracking, I have been reading up on methods and so far I understand there are two ways of doing it:
  1. Check Calls to VirtualProtect
  2. Hook the IAT address of the process and save bytes into memory, then copy again at a later stage and compare

I am new to anti RE but would love to know any other ways/information about this.
(This post was last modified: 06-08-2017, 12:44 PM by Mafia.)

Reply

RE: Detect API hooking #2
I personally am attached to comparing old IAT data to new IAT data, its easy to implement and hard to get around. However my advice would not be to focus so much on anti-debugging but instead proper obfuscation. If you want to see some killer examples of this, marble frameworks is excellent and has a lot of documentation inside.
I do not do any business deals.
If anyone contacts you to do business with my name, it is not me.

Reply

RE: Detect API hooking #3
You could compare bytes of a function to what they should be by reading the file off the disk. Also, make sure functions don't start with something like a jmp or call when they aren't supposed to.

Reply







Users browsing this thread: 1 Guest(s)