flat assembler
Message board for the users of flat assembler.

Index > Tutorials and Examples > [fasm2] Entry Point Hijack DLL

Author
Thread Post new topic Reply to topic
bitRAKE



Joined: 21 Jul 2003
Posts: 3977
Location: vpcmipstrm
bitRAKE 08 Jul 2024, 09:32
A cute tweet (are we still calling them tweets?) from Duncan Ogilvie (@mrexodia) showing a brief way to hijack a process entrypoint during DLL attachment. If you wondered what this might look like in assembly:
https://github.com/bitRAKE/odd_tests/tree/main/entryhook

... it's a neat trick.

_________________
¯\(°_o)/¯ “languages are not safe - uses can be” Bjarne Stroustrup
Post 08 Jul 2024, 09:32
View user's profile Send private message Visit poster's website Reply with quote
Display posts from previous:
Post new topic Reply to topic

Jump to:  


< Last Thread | Next Thread >
Forum Rules:
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Copyright © 1999-2024, Tomasz Grysztar. Also on GitHub, YouTube.

Website powered by rwasa.