About
Articles
Book Store
Distributed RCE
Downloads
Event Calendar
Forums
Live Discussion
Reference Library
RSS Feeds
Search
Users
What's New
Customize Theme
bluegrey
blackgreen
metal
simple
Flag:
Tornado!
Hurricane!
Login:
Password:
Remember Me
Register
Blogs
>>
AlexIonescu
's Blog
Created: Friday, August 11 2006 23:21.10 CDT
Printer Friendly ...
AV Companies: Learn to CODE!
Author:
AlexIonescu
# Views:
3614
I am getting sick of all this FUD online about companies being "unable to innovate" and being "hindered by Microsoft" because Patchguard got downgraded to XP/2K3 SP1.
Patchguard, if you don't know already, is a wonderful obfuscated system that Microsoft added to the kernel to block three things:
1) Rootkits [good]
2) Hobby hooking [bad, but just makes it more fun to try and disable it -- or connect a debugger, and it auto-disables!]
3)
Idiotic commercial AV/Firewall/etc (Daemon Tools) code
[GOOD].
These guys never took the time to read a book on how to, say, properly hook FS/IO operations and use proper filter drivers, or how to use image creation notification routines, or the myriad of other documented and valid methods of hooking that Windows NT supports. They instead chose to say F*ck it to everything, find some rootkit code online, and adapt it to fit their purposes.
So yes, I'm glad that Patchguard will make these companies force themselves to TRAIN their developers so they can have a CLUE about how to code kernel-mode drivers without messing up your computer. God, go read uninformed.org for the latest horror stories... AV drivers that edit Ring 0 memory tables to
make them accessible from Ring 3
. 5 buffer overflows in 20 lines of code, local privilege escalation bugs by the buecket, it only gets worse. These drivers are pests and Microsoft is doing a good job to wiping them out.
For malware developers and hobby development, this only makes it more fun for us, since Patchguard is relatively easy to disable and/or bypass, and it also makes for something fun to reverse (again, see uninformed).
Add New Comment
Comment:
There are
31,319
total registered users.
Recently Created Topics
[help] Unpacking VMP...
Mar/12
Reverse Engineering ...
Jul/06
hi!
Jul/01
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06
Recent Forum Posts
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow
let 'IDAPython' impo...
sohlow
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n
Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM
oleavr
Oct/24
Anatomy of a code tracer
hasherezade
Sep/24
IAT Patcher - new tool for ...
oleavr
Aug/27
CryptoShark: code tracer ba...
oleavr
Jun/25
Build a debugger in 5 minutes
More ...
Recent Blog Comments
nieo
on:
Mar/22
IAT Patcher - new tool for ...
djnemo
on:
Nov/17
Kernel debugger vs user mod...
acel
on:
Nov/14
Kernel debugger vs user mod...
pedram
on:
Dec/21
frida.github.io: scriptable...
capadleman
on:
Jun/19
Using NtCreateThreadEx for ...
More ...
Imagery
SoySauce Blueprint
Jun 6, 2008
[+] expand
View Gallery
(11) /
Submit