文件名称:anti-ssdt
介绍说明--下载内容均来自于网络,请自行研究使用
Windows XP是通过sysenter调用KiFastCallEntry将ntdll.dll的调用切换到内核的。KiFastCallEntry的原理是通过在SSDT中查找函数地址跳转。所以只要伪造一张原始SSDT,就可以使得SSDT-HOOK无效了。-Windows XP by calling KiFastCallEntry sysenter ntdll.dll call will switch to the kernel. KiFastCallEntry SSDT principle is to find the function by address jump. So long as the original forged an SSDT, you can make SSDT-HOOK invalid.
相关搜索: KiFastCallEntry
ssdt
anti-ssdt
anti
ss
anti
ssdt
hook
sysenter
kifastcallentry
ssdt
windows
kernel
windows
sysenter
SSDT
hook
ssdt
anti-ssdt
anti
ss
anti
ssdt
hook
sysenter
kifastcallentry
ssdt
windows
kernel
windows
sysenter
SSDT
hook
(系统自动生成,下载前可以参看下载内容)
下载文件列表
anti-ssdt.txt