Hmily 发表于 2009-7-28 13:28

PACE.Ilok.Resolving.The.Hooked.Ring0.Int3.Stolen.Calls-SND

Here a tutorial diving deep into the kernel and getting the correct addresses for the int3 call table that can exist in PACE/Ilok protected apps.
Pace/Iloks steals user mode calls and redirects them to an int3 table. Here the driver takes over and redirects those calls back to their correct locations.

Have fun reading it,
quosego/snd

caxfan 发表于 2013-11-15 23:11

可能会有要找的答案
页: [1]
查看完整版本: PACE.Ilok.Resolving.The.Hooked.Ring0.Int3.Stolen.Calls-SND