close

參考 http://www.codeproject.com/KB/security/AntiReverseEngineering.aspx

Table of Contents

1. Breakpoints
* Int 3
* Memory
* Hardware
2. Timing Attacks
* RDTSC
* Win32 Timing APIs
3. Windows Internals
* ProcessDebugFlags
* Debug Object Handle
* Thread Hiding
* BlockInput
* OutputDebugString
4. Process Exploitation
* Open Process
* Parent Processes
* Self-Debugging
* UnhandledExceptionFilter
* NtQueryObject
5. Anti-Dumping
* Nanomites
* Stolen Code (Stolen Bytes)
* SizeOfImage
* Virtual Machines
* Guard Pages
* Removing the PE Header
6. IA-32 Instruction Exploits
* Interrupt 2D
* Stack Segment
* Instruction Prefixes
7. OllyDBG Specific
* FindWindow
* OutputDebugString Exploit
8. WinDBG Specific
* FindWindow
9. Other Techniques
* Junk Code
* Native Code Permutations


arrow
arrow
    全站熱搜
    創作者介紹
    創作者 coolkevin 的頭像
    coolkevin

    about my life

    coolkevin 發表在 痞客邦 留言(0) 人氣()