-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Anti cuckoo and SIEM detect #142
Comments
Hey @chigosec , Indeed, this is a good feature to add, I had it on my to-do list. I will try to detect inline hooks in a global manner. |
Thx for your reply. |
@gsuberland what do you think of:
Then we can just read X number of bytes and do a memcmp. |
@LordNoteworthy I think we're already covering this in #139. Checking if the DLL is signed and verified isn't much use because they can just hook the verification APIs. It may be useful as a separate check, although to be honest I'd just call The problem with memcmp'ing code in mem vs disk is that there are relocation fixups applied so the data won't match. You also run into the problem where the function EP is actually a jump to the implementation ( |
I've opened #144 to cover the |
Hey @gsuberland I totally agree about the two points you made, let's go with your approach then. |
Hey. |
anti cuckoo like this https://github.com/David-Reguera-Garcia-Dreg/anticuckoo
The text was updated successfully, but these errors were encountered: