Page 1 of 1

My Frist Suggestion.

PostPosted: Mon Nov 23, 2009 7:19 pm
by x4NG3L
Hi L. Spiro, Thanks for Great Work!
The Self Modifyng of this soft is great ^^

I'm started in forum now.
and i'm here for my frist sugestion...

Is This:

-Unhook Api calls in Kernel mode. (Like SDDT Restore)

For example, xTRAP hook apis call for block some funntions in system.
For exemplo Keyboard events in user32, libs.
U Can Unhook this calls, int ring0, using one DRIVER/Rootkit. its great.
A Have code examples IF u need. only PM.

Thakns for great work!

Re: My Frist Suggestion.

PostPosted: Tue Nov 24, 2009 8:22 am
by L. Spiro
MHS already gives you the tools you need to find and remove hooks.
The hooked SSDT/SDT functions are shown for you in the Disassembler Helper window and scripts can be used to restore them and any other hooks in place.


L. Spiro

Re: My Frist Suggestion.

PostPosted: Tue Nov 24, 2009 8:59 am
by x4NG3L
Thanks!
I Go read about the scripts.

I'm seeing WriteVirtualMemory, and ReadVirtualMemory hooked....
This is probably used by MHS....
It Hooks if before anti-cheat try to hook?
If Yes, can u say to me a list of hooked by MHS and when?

ps: only for don't unhook wrong calls... =P

Re: My Frist Suggestion.

PostPosted: Tue Nov 24, 2009 4:23 pm
by L. Spiro
MHS does not hook anything.
Any hooks you see are caused by other software.


Use ReadLocalMemory() and WriteLocalMemory() to read and write kernel RAM without being stopped by anti-cheat hooks.


L. Spiro

Re: My Frist Suggestion.

PostPosted: Wed Nov 25, 2009 11:27 am
by x4NG3L
Great.
I Have one exemple of script code to unhook calls of anti-cheats?

Currently, i'm trying to use one SendKeys() Function with XTRAP opened.
I Cant unpack it, my asm knowledge is low to unpack themida ¬¬
Trying to Bypass hooks. for exemple to use this funciton.
If u have one script code exemple to uses as referente will be welcome

^^

Re: My Frist Suggestion.

PostPosted: Wed Nov 25, 2009 2:08 pm
by L. Spiro
There is a script in the help file that lists all hooks outside of the SSDT/SDT.

Once you find a hook, either in the SSDT/SDT using the Disassembler or anywhere else in kernel using the script, you can make note of the actual bytes that should be there when the hook does not exist.

You can patch the hook by writing the original bytes over the hook.
There is no need for an example for this. It is a simple WriteLocalMemory() call.


L. Spiro

Re: My Frist Suggestion.

PostPosted: Thu Nov 26, 2009 2:49 am
by x4NG3L
Great, problem solved!
I can do this now. :mrgreen:



TY 8)