반응형

URL : http://www.codeproject.com/KB/security/AntiReverseEngineering.aspx

'코드프로젝트'에 기고된 Anti-Reverse 관련 Article 입니다.

1. Breakpoints
   ㅇ Int 3
   ㅇ Memory
   ㅇ Hardware

2. Timing Attacks
   ㅇ RDTSC
   ㅇ Win32 Timing APIs

3. Windows Internals
   ㅇ ProcessDebugFlags
   ㅇ Debug Object Handle
   ㅇ Thread Hiding
   ㅇ BlockInput
   ㅇ OutputDebugString

4. Process Exploitation
   ㅇ OpenProcess
   ㅇ Parent Processes
   ㅇ Self-Debugging
   ㅇ UnhandledExceptionFilter
   ㅇ NtQueryObject

5. Anti-Dumping
   ㅇ Nanomites
   ㅇ Stolen Code (Stolen Bytes)
   ㅇ SizeOfImage
   ㅇ Virtual Machines
   ㅇ Guard Pages
   ㅇ Removing the PE Header

6. IA-32 Instruction Exploits
   ㅇ Interrupt 2D
   ㅇ Stack Segment
   ㅇ Instruction Prefixes

7. OllyDBG Specific
   ㅇ FindWindow
   ㅇ OutputDebugString Exploit

8. WinDBG Specific
   ㅇ FindWindow

9. Other Techniques
   ㅇ Junk Code
   ㅇ Native Code Permutations


출처 : 코드프로젝트
반응형
AND