Hi.
I've read some general tutorials about that, but most of them use OllyDbg, which is detected by hack shield.
I wonder how do you guys get those addresses which are then used for detouring ...
Maybe some hints which tools to use ... ?
And maybe how to find the functions?
:eek:
EDIT:
[Only registered and activated users can see links. Click Here To Register...]
Seems like the sending is done in ntdll ... do I get anything closer .. waaaawh
EDIT2: So, the mov edi, edi actually does nothing. Or in other words, it provides a space for hooking.
If I use this as a sending function:
push ebp
mov ebp, esp
sub esp, 18
JMP PBACK
.. what address does needs to be in PBACK? Before "mov edi, edi", right on that address, after or on PUSH?
I've read some general tutorials about that, but most of them use OllyDbg, which is detected by hack shield.
I wonder how do you guys get those addresses which are then used for detouring ...
Maybe some hints which tools to use ... ?
And maybe how to find the functions?
:eek:
EDIT:
[Only registered and activated users can see links. Click Here To Register...]
Seems like the sending is done in ntdll ... do I get anything closer .. waaaawh
EDIT2: So, the mov edi, edi actually does nothing. Or in other words, it provides a space for hooking.
If I use this as a sending function:
push ebp
mov ebp, esp
sub esp, 18
JMP PBACK
.. what address does needs to be in PBACK? Before "mov edi, edi", right on that address, after or on PUSH?