📚 OpenRCE is preserved as a read-only archive. Launched at RECon Montreal in 2005. Registration and posting are disabled.








Flag: Tornado! Hurricane!

Blogs >> msuiche's Blog

Created: Sunday, December 10 2006 18:41.36 CST Modified: Sunday, December 10 2006 18:41.36 CST
This is an imported entry. View original. Printer Friendly ...
IDTGuard v0.1 December, 2005 Build
Author: msuiche # Views: 1173

This is a very interessting tool I did one year ago to realize proof of concept of my IDT authenticity theory.

Tool can be found at : IDTGuard v0.1

Note: This tool doesn’t work with Windows 2003 SP1 cause I used \PhysicalMemory. (http://technet2.microsoft.com/WindowsServer/en/library/e0f862a3-cf16-4a48-bea5-f2004d12ce351033.mspx?mfr=true

The following paste is a sample of use with the 0×2D interrupt on Windows 2000.

Interrupt Descriptor Table(IDT) Guard
[email protected] www.msuiche.net
Version 0.1 - (c) December, 2005 -

INT 0×01 has been hooked at 0×816C001D (Org INT = 0×80466786) by Unknow
INT 0×02 has been hooked at 0×0000145E (Org INT = 0×80466826) by Unknow
INT 0×03 has been hooked at 0×816C003C (Org INT = 0×80466A5E) by Unknow
INT 0×08 has been hooked at 0×000014B8 (Org INT = 0×80467670) by Unknow
INT 0×0E has been hooked at 0×816C007A (Org INT = 0×804688F4) by Unknow
INT 0×13 has been hooked at 0×8046900B (Org INT = 0×80468C8F) by ntoskrnl.exe
INT 0×1F has been hooked at 0×80064908 (Org INT = 0×80468C8F) by hal.dll
INT 0×2D has been hooked at 0xBE8C2B5C (Org INT = 0×8046694E) by DbgMsg.SYS
INT 0×37 has been hooked at 0×800640B8 (Org INT = 0×80464C56) by hal.dll
INT 0×3D has been hooked at 0×80065254 (Org INT = 0×80464C92) by hal.dll
INT 0×41 has been hooked at 0×800650C8 (Org INT = 0×80464CBA) by hal.dll
INT 0×50 has been hooked at 0×80064190 (Org INT = 0×80464D50) by hal.dll
INT 0×51 has been hooked at 0×816878A4 (Org INT = 0×80464D5A) by Unknow
INT 0×52 has been hooked at 0×81688DC4 (Org INT = 0×80464D64) by Unknow
INT 0×83 has been hooked at 0×81674424 (Org INT = 0×80464F4E) by Unknow
INT 0×92 has been hooked at 0×816B4584 (Org INT = 0×80464FE4) by Unknow
INT 0×93 has been hooked at 0×81686DC4 (Org INT = 0×80464FEE) by Unknow
INT 0xA2 has been hooked at 0×81687D64 (Org INT = 0×80465084) by Unknow
INT 0xA3 has been hooked at 0×816B6504 (Org INT = 0×8046508E) by Unknow
INT 0xB1 has been hooked at 0×816F8044 (Org INT = 0×8046511A) by Unknow
INT 0xB3 has been hooked at 0×816891C4 (Org INT = 0×8046512E) by Unknow
INT 0xC1 has been hooked at 0×800642FC (Org INT = 0×804651BA) by hal.dll
INT 0xD1 has been hooked at 0×80063964 (Org INT = 0×8046525A) by hal.dll
INT 0xE1 has been hooked at 0×80064858 (Org INT = 0×804652FA) by hal.dll
INT 0xE3 has been hooked at 0×800645D4 (Org INT = 0×8046530E) by hal.dll
INT 0xFD has been hooked at 0×80064D64 (Org INT = 0×804653E2) by hal.dll
INT 0xFE has been hooked at 0×80064EEC (Org INT = 0×804653E9) by hal.dll

27 Interruptions have been modified.

Help:
q :quit
s :reshow list of modified interrupt
r X :restore interruption X in IDT(sample: r 0xA1)
h :show this help

cmd>r 0×2D
Are you sure that you want to restore the Interruption 0×2D(45)? (y/n)y

Let’s restore it !
I will do that :
Offset : 0xBE8C2B5C => 0×8046694E
Dpl : 0×01 => 0×01
Type : IntG32 => IntG32

Are you sure?(y/n)y

Reconstrution of the INT 0×2D
Offset value…Done
Dpl(Descriptor Privilege Level) value…Done
Type value…Done

OKiE

cmd>s
INT 0×01 has been hooked at 0×816C001D (Org INT = 0×80466786) by Unknow
INT 0×02 has been hooked at 0×0000145E (Org INT = 0×80466826) by Unknow
INT 0×03 has been hooked at 0×816C003C (Org INT = 0×80466A5E) by Unknow
INT 0×08 has been hooked at 0×000014B8 (Org INT = 0×80467670) by Unknow
INT 0×0E has been hooked at 0×816C007A (Org INT = 0×804688F4) by Unknow
INT 0×13 has been hooked at 0×8046900B (Org INT = 0×80468C8F) by ntoskrnl.exe
INT 0×1F has been hooked at 0×80064908 (Org INT = 0×80468C8F) by hal.dll
INT 0×37 has been hooked at 0×800640B8 (Org INT = 0×80464C56) by hal.dll
INT 0×3D has been hooked at 0×80065254 (Org INT = 0×80464C92) by hal.dll
INT 0×41 has been hooked at 0×800650C8 (Org INT = 0×80464CBA) by hal.dll
INT 0×50 has been hooked at 0×80064190 (Org INT = 0×80464D50) by hal.dll
INT 0×51 has been hooked at 0×816878A4 (Org INT = 0×80464D5A) by Unknow
INT 0×52 has been hooked at 0×81688DC4 (Org INT = 0×80464D64) by Unknow
INT 0×83 has been hooked at 0×81674424 (Org INT = 0×80464F4E) by Unknow
INT 0×92 has been hooked at 0×816B4584 (Org INT = 0×80464FE4) by Unknow
INT 0×93 has been hooked at 0×81686DC4 (Org INT = 0×80464FEE) by Unknow
INT 0xA2 has been hooked at 0×81687D64 (Org INT = 0×80465084) by Unknow
INT 0xA3 has been hooked at 0×816B6504 (Org INT = 0×8046508E) by Unknow
INT 0xB1 has been hooked at 0×816F8044 (Org INT = 0×8046511A) by Unknow
INT 0xB3 has been hooked at 0×816891C4 (Org INT = 0×8046512E) by Unknow
INT 0xC1 has been hooked at 0×800642FC (Org INT = 0×804651BA) by hal.dll
INT 0xD1 has been hooked at 0×80063964 (Org INT = 0×8046525A) by hal.dll
INT 0xE1 has been hooked at 0×80064858 (Org INT = 0×804652FA) by hal.dll
INT 0xE3 has been hooked at 0×800645D4 (Org INT = 0×8046530E) by hal.dll
INT 0xFD has been hooked at 0×80064D64 (Org INT = 0×804653E2) by hal.dll
INT 0xFE has been hooked at 0×80064EEC (Org INT = 0×804653E9) by hal.dll

cmd>q



If you wish to comment on this blog entry, please do so on the original site it was imported from.

There are 31,328 total registered users.


Recently Created Topics
[help] Unpacking VMP...
Mar/12
Reverse Engineering ...
Jul/06
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06
Question about memor...
Dec/12


Recent Forum Posts
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow
let 'IDAPython' impo...
sohlow
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit