參考 http://www.codeproject.com/KB/security/AntiReverseEngineering.aspx Table of Contents 1. Breakpoints * Int 3 * Memory * Hardware 2. Timing Attacks * RDTSC * Win32 Timing APIs 3. Windows Internals * ProcessDebugFlags * Debug Object Handle * Thread Hiding * BlockInput * OutputDebugString 4. Process Exploitation * Open Process * Parent Processes * Self-Debugging * UnhandledExceptionFilter * NtQueryObject 5. Anti-Dumping * Nanomites * Stolen Code (Stolen Bytes) * SizeOfImage * Virtual Machines * Guard Pages * Removing the PE Header 6. IA-32 Instruction Exploits * Interrupt 2D * Stack Segment * Instruction Prefixes 7. OllyDBG Specific * FindWindow * OutputDebugString Exploit 8. WinDBG Specific * FindWindow 9. Other Techniques * Junk Code * Native Code Permutations
文章標籤
全站熱搜
創作者介紹
創作者 coolkevin 的頭像
coolkevin

about my life

coolkevin 發表在 痞客邦 留言(0) 人氣(91)