> Unless someone can justify another reason for prefixing most OS
functions (even non-exported ones) with mov edi, edi besides a
five byte placeholder for a future call or jmp instruction, it appears
as if MS is using inline hooks
Yes, it’s exactly what I was asking myself: why go to extremes?
Always “no” or always “yes” - why?
Take any other potential security threat, ActiveX or even ANY
software at all; the end user knows what’s going on (“Do you
want <…> to be installed?” plus “Signed by ABC, Inc.” plus
“No personal info will be sent” etc.
“It’s hard to predict, especially the future” (M.Twain). It is true
that to close the hooking hole completely might be better that
keeping it completely open, but IMHO the best solution is
somewhere in between: just (a) let the user know, and (b)
state your responsibility in some appropriate form.
As of now, you can install the user mode hooks [technically a
different kind of beast altogether, but the security considerations
apply] , including the kbd ones, through SetWindowsHook[Ex],
and there is no API to find out what UM hooks are currently installed.
I’d allow hooking, winpump or detour styled, but only along with
broadcasting any hook-install event and making all hooks
listable at all times.
----- Original Message -----
From:
To: “Windows File Systems Devs Interest List”
Sent: Monday, November 14, 2005 8:25 AM
Subject: Re: Re: [ntfsd] Is hooking really evil ?
> Hooking isn’t really evil, MS does it!!! (waiting for obnoxious responses
> ;)) Unless someone can justify another reason for prefixing most OS
> functions (even non-exported ones) with mov edi, edi besides a five byte
> placeholder for a future call or jmp instruction, it appears as if MS is
> using inline hooks in its own flagship product, for a (somewhat)
> legitimate use
>>
>> From: Steve Dispensa
>> Date: 2005/11/13 Sun PM 04:23:02 EST
>> To: “Windows File Systems Devs Interest List”
>> Subject: Re: [ntfsd] Is hooking really evil ?
>>
>> On Nov 13, 2005, at 2:59 PM, Oliver Schneider wrote:
>> >> It is called RootKit Hook Analyzer and it shows all kernel system
>> >> services with name, address, the responsible
>> >> kernel driver along with company name, product and description.
>> > Have you considered “cavity infection”, jumptables in nonpaged pool
>> > (untagged ;), jumptables in K-Mode DLLs as well? What about inline
>> > hooks?
>>
>> Good idea - while you’re at it, I just dealt with some commercial
>> software that modifies functions in the middle - couldya do
>> something about that too while you’re at it? 
>>
>>
>>
>> ----------------------------------
>> Steve Dispensa
>> MVP - Windows DDK
>> www.kernelmustard.com
>>
>>
>>
>> —
>> Questions? First check the IFS FAQ at
>> https://www.osronline.com/article.cfm?id=17
>>
>> You are currently subscribed to ntfsd as: xxxxx@ainfosec.com
>> To unsubscribe send a blank email to xxxxx@lists.osr.com
>>
>
>
>
> —
> Questions? First check the IFS FAQ at
> https://www.osronline.com/article.cfm?id=17
>
> You are currently subscribed to ntfsd as: xxxxx@bellsouth.net
> To unsubscribe send a blank email to xxxxx@lists.osr.com
>