參考 http://www.codeproject.com/KB/security/AntiReverseEngineering.aspx
Table of Contents
1. Breakpoints
* Int 3
* Memory
* Hardware
2. Timing Attacks
* RDTSC
* Win32 Timing APIs
3. Windows Internals
* ProcessDebugFlags
* Debug Object Handle
* Thread Hiding
* BlockInput
* OutputDebugString
4. Process Exploitation
* Open Process
* Parent Processes
* Self-Debugging
* UnhandledExceptionFilter
* NtQueryObject
5. Anti-Dumping
* Nanomites
* Stolen Code (Stolen Bytes)
* SizeOfImage
* Virtual Machines
* Guard Pages
* Removing the PE Header
6. IA-32 Instruction Exploits
* Interrupt 2D
* Stack Segment
* Instruction Prefixes
7. OllyDBG Specific
* FindWindow
* OutputDebugString Exploit
8. WinDBG Specific
* FindWindow
9. Other Techniques
* Junk Code
* Native Code Permutations
- Aug 04 Tue 2009 15:46
[note] anti-debug
close
全站熱搜
留言列表
發表留言