Hacking Arts
CodeProject Anti-Reverse Engineering Guide 본문
1. Breakpoints
ㅇ Int 3
ㅇ Memory
ㅇ Hardware
2. Timing Attacks
ㅇ RDTSC
ㅇ Win32 Timing APIs
3. Windows Internals
ㅇ ProcessDebugFlags
ㅇ Debug Object Handle
ㅇ Thread Hiding
ㅇ BlockInput
ㅇ OutputDebugString
4. Process Exploitation
ㅇ OpenProcess
ㅇ Parent Processes
ㅇ Self-Debugging
ㅇ UnhandledExceptionFilter
ㅇ NtQueryObject
5. Anti-Dumping
ㅇ Nanomites
ㅇ Stolen Code (Stolen Bytes)
ㅇ SizeOfImage
ㅇ Virtual Machines
ㅇ Guard Pages
ㅇ Removing the PE Header
6. IA-32 Instruction Exploits
ㅇ Interrupt 2D
ㅇ Stack Segment
ㅇ Instruction Prefixes
7. OllyDBG Specific
ㅇ FindWindow
ㅇ OutputDebugString Exploit
8. WinDBG Specific
ㅇ FindWindow
9. Other Techniques
ㅇ Junk Code
ㅇ Native Code Permutations
출처 : http://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide
'Reversing > Anti Debugging' 카테고리의 다른 글
Stolen Byte(Remove OEP) (0) | 2014.12.29 |
---|