Extending Control, API Hooking

7 Pages Posted: 17 Apr 2018

Date Written: March 31, 2006

Abstract

This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as a launch platform for your shellcode and that the various system components are.

We will continue here with DLL injection before starting on API hooking. At this point we have learnt the basics of DLL injection and are ready to move onto applying it. This article will include a section on functions and calls, extending DLL injection and the n move to the actual API hooking process (that we will extend) in coming articles. When all of this is put together, we will have the foundations for creating shellcode for exploits and hence an understanding of the process that penetration testers and hacker s use in exploiting systems. With these skills, you will see how it is possible to either create your own exploit code from scratch or even to modify existing exploit code to either add functionality or in order to bypass signature based IDS/IPS filters.

This article continues a monthly series designed to take the reader from a novice to being able to create and deploy their own shellcode and exploits.

Suggested Citation

Wright, Craig S, Extending Control, API Hooking (March 31, 2006). Available at SSRN: https://ssrn.com/abstract=3153494 or http://dx.doi.org/10.2139/ssrn.3153494

Craig S Wright (Contact Author)

nChain ( email )

London
United Kingdom

RCJBR Holdings PLC ( email )

5 Brayford Square
London, E1 0SG
United Kingdom

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
223
Abstract Views
1,236
Rank
250,418
PlumX Metrics