DLL Hiding menu

Shout-Out

User Tag List

Thread: DLL Hiding

Page 4 of 4 FirstFirst 1234
Results 46 to 50 of 50
  1. #46
    nitrogrlie's Avatar Member
    Reputation
    11
    Join Date
    Oct 2009
    Posts
    81
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Cypher View Post
    Bump.

    Nitrogrlie:

    Did you try what I suggested to prove my claims? (VMMap and ModuleShark)
    Okay, found some time last night to try VMMap and you are correct, it does find the unlinked modules. Process Explorer however doesn't list the DLLs in the Lower Pane after I remove them.

    Currently I'm trying to figure out how to obtain the VadRoot address and write my own Vad walker from user-space.

    DLL Hiding
  2. #47
    Cypher's Avatar Kynox's Sister's Pimp
    Reputation
    1358
    Join Date
    Apr 2006
    Posts
    5,368
    Thanks G/R
    0/6
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by flo8464 View Post
    I have to admit, I didn't really lookup what NtQueryVirtualMemory does in general, had problems finding a good documentation.

    But I still don't really understand why they don't scan for signatures of known hacks.
    They do...

    You have to use VirtualQuery though in order to enumerate all the memory regions otherwise it would be horribly inefficient and potentially inaccurate.

  3. #48
    Cypher's Avatar Kynox's Sister's Pimp
    Reputation
    1358
    Join Date
    Apr 2006
    Posts
    5,368
    Thanks G/R
    0/6
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by nitrogrlie View Post
    Okay, found some time last night to try VMMap and you are correct, it does find the unlinked modules. Process Explorer however doesn't list the DLLs in the Lower Pane after I remove them.

    Currently I'm trying to figure out how to obtain the VadRoot address and write my own Vad walker from user-space.
    Process Explorer uses the PEB linked list, VMMap uses the kernel file mappings.

    Hence my point about hooking NtQueryVirtualMemory.

    Also, you can't directly read or write to the VAD list from usermode afaik. I'm pretty sure that's all stored in kernel memory.

    At any rate, you'll still need to hook the NtQueryVirtualMemory API if you're in usermode, because even if you can work out how to write to the VAD tree that will do you little good because there's still no way to spoof the values (i.e. keep the pages executable but make them look free).*

    * Of course you can write to the VAD tree indirectly using the VirtualQuery/VirtualProtect APIs, however I was talking about modifying the VADs "directly".

  4. #49
    nitrogrlie's Avatar Member
    Reputation
    11
    Join Date
    Oct 2009
    Posts
    81
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Cypher View Post
    At any rate, you'll still need to hook the NtQueryVirtualMemory API if you're in usermode, because even if you can work out how to write to the VAD tree that will do you little good because there's still no way to spoof the values (i.e. keep the pages executable but make them look free).
    You are probably right, but I wonder if you couldn't get away with labeling them as free but page guarding them so they don't get over-written and playing with VirtualProtect when you need to execute. N/m I guess that won't work cause you need at least some stub of executable thread always spinning to detect even the smallest IPC message and handle it.

  5. #50
    Cypher's Avatar Kynox's Sister's Pimp
    Reputation
    1358
    Join Date
    Apr 2006
    Posts
    5,368
    Thanks G/R
    0/6
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by nitrogrlie View Post
    You are probably right, but I wonder if you couldn't get away with labeling them as free but page guarding them so they don't get over-written and playing with VirtualProtect when you need to execute. N/m I guess that won't work cause you need at least some stub of executable thread always spinning to detect even the smallest IPC message and handle it.
    Still wouldn't work, because you still need to hide the file mapping, which you can't do from usermode without either manually mapping your module or hooking NtQueryVirtualMemory.

Page 4 of 4 FirstFirst 1234

Similar Threads

  1. [C#] [SRC] Hide a DLL by unlinking it from PEB
    By ddebug in forum WoW Memory Editing
    Replies: 19
    Last Post: 05-23-2018, 08:42 AM
  2. Hide in the wall of AV
    By Matt in forum World of Warcraft Exploits
    Replies: 2
    Last Post: 10-10-2006, 07:01 PM
  3. WSG Hiding Spot [Horde]
    By DaUberBird in forum World of Warcraft Exploits
    Replies: 5
    Last Post: 06-13-2006, 01:30 PM
  4. Alliance Warsong Hiding Spot
    By lvlrbojang1es in forum World of Warcraft Exploits
    Replies: 11
    Last Post: 06-01-2006, 02:06 AM
All times are GMT -5. The time now is 04:11 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search