• XSS.stack #1 – первый литературный журнал от юзеров форума

Kernel Detective - new security & analysis tool

Одинокий Волк

CPU register
Забанен
Регистрация
16.05.2005
Сообщения
1 264
Решения
1
Реакции
3
Пожалуйста, обратите внимание, что пользователь заблокирован
Kernel Detective бесплатная утилита которая поможет вам обнаружать, изучать, вручную менять и исправлять некоторые модификации ядра Windows NT.
// Ma-stiff

Kernel Detective is a free tool that help you detect, analyze, manually modify and fix some Windows NT kernel modifications. Kernel Detective gives you the access to the kernel directly so it's not oriented for newbies. Changing essential kernel-mode objects without enough knowledge will lead you to only one result, BSOD !!

Supported NT versions : XP(sp1-sp2-sp3) - Vista Ultimate build 6000

Screenshot:
kdyu2.png


With Kernel Detective you can:

Enumerate running processes and print important values like Process Id, Parent Process Id, ImageBase, EntryPoint, VirtualSize, PEB block address and EPROCESS block address. Kernel Detective also has special scan methods for detecting hidden processes

Enumerate a specific running processe Dynamic-Link Libraries. Also show every Dll ImageBase, EntryPoint, Size and Path .

Enumerate loaded kernel-mode drivers and show every driver ImageBase, EntryPoint, Size, Name and Path. Also it has special methods for detecting hidden drivers.

Scan the system service table (SSDT) and show every service function address and the real function address. You can restore single service function address or restore the whole table.

Scan the shadow system service table (Shadow SSDT) and show every shadow service function address and the real function address. You can restore single shadow service function address or restore the whole table

Scan the interrupts table (IDT) and show every interrupt handler offset, selector, type, Attributes and real handler offset. This is applied to every processor in a multi-processors machines.

Scan the important system kernel modules, detect the modifications in it's body and analyze it. For now it can detect and restore inline code modifications, EAT and IAT hooks. I'm looking for more other types of hooks next releases of Kernel Detective.

A nice disassembler rely on OllyDbg disasm engine, thanks Oleh Yuschuk for publishing the source code of your nice disasm engine . With it you can disassemble, assemble and hex edit virtual memory of a specific process or even the kernel space memory. Kernel Detective use it's own Read/Write routines from kernel-mode and doesn't rely on any windows API. That make Kernel Detective able to R/W processes VM even if NtReadProcessMemory/NtWriteProcessMemory is hooked, also bypass the hooks on other kernel-mode important routines like KeStackAttachProcess and KeAttachProcess

Show the messages sent by drivers to the kernel debugger just like Dbgview by Mark Russinovich. It's doing this by hooking interrupt 0x2d wich is responsible for outputing debug messages. Hooking interrupts may cause problems on some machines so DebugView is turned off by default, to turn it on you must run Kernel Detective with "-debugv" parameter.

:zns5: Скачать|Download
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Одинокий Волк
А какое отношение это имеет к вирусологии.
Эм.. это разве не для дэбага прога, вроде по работе с процессами включая скрытые... если нет тогда перенесу скажите только что это тогда.
 
Одинокий Волк
Для работы с ядром Винды.
Kernel Detective is a free tool that help you detect, analyze, manually modify and fix some Windows NT kernel modifications.
Kernel Detective бесплатная утилита которая поможет вам обнаружать, изучать, вручную менять и исправлять некоторые модификации ядра Windows NT.

Вообще по-моему и дебаггеры не в вирусологию надо.
 
Kernel Detective v1.1


-Added : Hidden Handles Detection, show every handle's Object name and address + ability to close the handle.
-Improved : Processes Detection, new undocumented algorithms implemented.
-Improved : Drivers Detection, undocumented algorithms implemented.
-Improved : SSDT Hooks Detection, detection algorithm improved to bypass KeServiceDescriptorTable EAT/IAT hooks.
-Improved : User-space memory reader/writer and symbols decoder.
-Improved : Application GUI.
-Fixed : BSOD while driver initializing and most known bugs in version 1.0.


Download Link:
http://www.at4re.com/files/Tools/Releases/...ective_v1.1.zip
 
What's new in v1.3.0 :
[ + ] Support for Vista SP2
[ + ] Suspend/Resume Process/Thread
[ + ] Force Resume Process/Thread
[ + ] Unloaded drivers viewer
[ + ] Object Types viewer
[ + ] Timer Objects viewer
[ + ] Kernel Notification Callbacks viewer (Process/Thread/Image/Registry)
[ + ] Added simple hex viewer with the disassembler
[ + ] Force Delete files (even files in use)
[ + ] File Signature Verifying
[ + ] Ability to save list contents
[*] Improved Hidden Drivers Detection
[*] Improved disassembler coloring
[!] Fixed annoying problem with listview sorting and refreshing
[!] Fixed known minor bugs in v1.2.1


Download Link :
http://www.at4re.com/files/Tools/Releases/...TIVE_V1.3.0.ZIP


SHA-256 : 7E01B3DA8B844C45B69CE1F3615FC0350D26C56B93AFE82E2F1756A318266011
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх