質問

I'm working on a rootkit and reversing it.I'm supposing to write my anti-rk specific for this kind of rootkit.The rootkit hooks some kernel-mode functions that can't be unhooked from user-mode, or if I unhook them from user-mode they will not get away and will be back. So what's your suggestions?

役に立ちましたか?

解決

There are a lot of example code and open source projects out there, which does this. You can refer their source to know SSDT unhooking. Few examples:
https://code.google.com/p/arkitlib/
https://code.google.com/p/oark/

ライセンス: CC-BY-SA帰属
所属していません StackOverflow
scroll top