Skip to content

zimnyaa/detect-hooks

 
 

Repository files navigation

Detect-Hooks

This is a fork of the detect-hooks BOF, rebuilt for sliver.

Also, there's a new BOF, hooks-kernel, that uses opcode comparisons with lots of false positives instead of syscall stub signatures to find hooks in kernelbase/kernel32. In this example it looks for jmp, but many EDRs use push+ret instead.

sliver BOF porting notes

trustedsec/COFFLoader does not load any functions from windows.h, so frequent LoadLibrary calls in BOFs have to be replaced with KERNEL32$LoadLibraryA.

Aside from this, the BOFs are just built as:

x86_64-w64-mingw32-gcc -c detect-hooks.c -o detect-hooks-mingw64-ll.o
i686-w64-mingw32-gcc -c detect-hooks.c -o detect-hooks-mingw32-ll.o

Load this with extensions load&extensions install.

Languages

  • C 100.0%