Notice
Recent Posts
관리 메뉴

Hacking Arts

CodeProject Anti-Reverse Engineering Guide 본문

Reversing/Anti Debugging

CodeProject Anti-Reverse Engineering Guide

Rakehell 2014. 12. 24. 01:49

1. Breakpoints

   ㅇ Int 3
   ㅇ Memory
   ㅇ Hardware

2. Timing Attacks
   ㅇ RDTSC
   ㅇ Win32 Timing APIs

3. Windows Internals
   ㅇ ProcessDebugFlags
   ㅇ Debug Object Handle
   ㅇ Thread Hiding
   ㅇ BlockInput
   ㅇ OutputDebugString

4. Process Exploitation
   ㅇ OpenProcess
   ㅇ Parent Processes
   ㅇ Self-Debugging
   ㅇ UnhandledExceptionFilter
   ㅇ NtQueryObject

5. Anti-Dumping
   ㅇ Nanomites
   ㅇ Stolen Code (Stolen Bytes)
   ㅇ SizeOfImage
   ㅇ Virtual Machines
   ㅇ Guard Pages
   ㅇ Removing the PE Header

6. IA-32 Instruction Exploits
   ㅇ Interrupt 2D
   ㅇ Stack Segment
   ㅇ Instruction Prefixes

7. OllyDBG Specific
   ㅇ FindWindow
   ㅇ OutputDebugString Exploit

8. WinDBG Specific
   ㅇ FindWindow

9. Other Techniques
   ㅇ Junk Code
   ㅇ Native Code Permutations


출처 : http://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide

'Reversing > Anti Debugging' 카테고리의 다른 글

Stolen Byte(Remove OEP)  (0) 2014.12.29