Skip to content

Different API Hooking Techniques - Ring3 (Detours, Trampoline, IAT and EAT) for both, x64 and x32 PE files - Since 2014.

License

Notifications You must be signed in to change notification settings

lcsig/API-Hooking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

API Hooking Techniques

This repostiroty contains some tecniques for Windows API Hooking for research and educational purposes only!

Ring 3

The included techniques are:

  • Detours Hook (x64/86)
  • Trampoline Hook (x64/x86)
  • Import Address Table (IAT) Hook (x64/x86)
  • Export Address Table (EAT) Hook (x64/x86)

Notes:

  • Treampoline Hook needs a fix when copying the instruction from the original function into the new function address. The addresses in the instructions must be changed, otherwise the hook won't work.
  • The TestApp is simply a while statement that contains a call into the MessageBoxA function. In TestApp86.exe, and in a rare case, the visual studio optimizer has stored the original API address in the ESI register which makes the IAT hook useless in that case. As a result, I compiled another version after turning off the optimizer (TestApp86OptOff.exe) to validate the hook results! Ring3_IAT_Optimization_Off
  • EAT hook won't work for x64 bits because the relative addresses in EAT are 4 bytes for both x32 and x64 bits PE files. As a result, a jump instruction has been created in the same targeted module that is being hooked which will solve the issue.

Example

Ring_3

About

Different API Hooking Techniques - Ring3 (Detours, Trampoline, IAT and EAT) for both, x64 and x32 PE files - Since 2014.

Topics

Resources

License

Stars

Watchers

Forks