選択できるのは25トピックまでです。 トピックは、先頭が英数字で、英数字とダッシュ('-')を使用した35文字以内のものにしてください。

README.md 1.4KB

12345678910111213141516171819202122232425262728293031323334353637
  1. Introduction
  2. ============
  3. This project aims to give a simple overview on how good various x64 hooking
  4. engines (on windows) are. I'll try to write various functions, that are hard to
  5. patch and then see how each hooking engine does.
  6. I'll test:
  7. * [EasyHook](https://easyhook.github.io/)
  8. * [PolyHook](https://github.com/stevemk14ebr/PolyHook)
  9. * [MinHook](https://www.codeproject.com/Articles/44326/MinHook-The-Minimalistic-x-x-API-Hooking-Libra)
  10. * [Mhook](http://codefromthe70s.org/mhook24.aspx)
  11. (I'd like to test detours, but I'm not willing to pay for it. So that isn't
  12. tested :( )
  13. There are multiple things that make hooking difficult. Maybe you want to patch
  14. while the application is running -- in that case you might get race conditions,
  15. as the application is executing your half finished hook. Maybe the software has
  16. some self protection features (or other software on the system provides that,
  17. e.g. Trustee Rapport)
  18. Evaluating how the hooking engines stack up against that is not the goal here.
  19. Neither are non-functional criteria, like how fast it is or how much memory it
  20. needs for each hook. This is just about the challenges the function to be
  21. hooked itself poses.
  22. Namely:
  23. * Are jumps relocated?
  24. * What about RIP adressing?
  25. * If there's a loop at the beginning / if it's a tail recurisve function, does
  26. the hooking engine handle it?
  27. * How good is the dissassembler, how many instructions does it know?
  28. * Can it hook already hooked functions?
  29. Test cases
  30. ==========