Skip to content

Commit 0fdfe7a

Browse files
committed
Detect WOW64 stub modification
1 parent 48c8dee commit 0fdfe7a

File tree

2 files changed

+6
-1
lines changed

2 files changed

+6
-1
lines changed

HookDump.cpp

+1-1
Original file line numberDiff line numberDiff line change
@@ -596,7 +596,7 @@ namespace zp
596596
//check for inter-segment branch
597597
if (instruction.meta.branch_type != ZYDIS_BRANCH_TYPE_FAR)
598598
{
599-
printf("\n[-] WOW64 system call stub [WOW]\n");
599+
printf("[-] WOW64 system call stub [WOW]\n");
600600
DumpInstruction(instruction, (UINT_PTR)pTeb->WOW32Reserved);
601601
return TRUE;
602602
}

README.md

+5
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,10 @@ Please refer to the Zeroperil blog post for more information [https://zeroperil.
2323

2424
A jump instruction has been patched into the function to redirect execution flow
2525

26+
### WOW
27+
28+
Detection of the WOW64 syscall stub being hooked, which allows filtering of all system calls
29+
2630
### EAT
2731

2832
The address in the export address table does not match the address in the export address table in the copy on disc
@@ -34,3 +38,4 @@ GetProcAddress hook, an experimental feature, this is only output in verbose mod
3438
## Verification
3539

3640
The only way to truly verify the correct working of the program is to check in a debugger if hooks are present. If you are getting a zero hooks result and are expecting to see something different, then first verify this in a debugger and please get in touch.
41+

0 commit comments

Comments
 (0)