PTE Hook:一种利用页表重映射攻击实现的内核函数Hook
本文介绍了 PTE Hook 的原理与实现过程,先从 x64 架构下虚拟地址到物理地址的寻址机制、页表自映射原理讲起,解释了如何通过构造虚拟地址直接访问并修改 PTE。随后分析了传统 inlineHook 的全局性缺陷及其被 PatchGuard 检测的风险,提出通过伪造页表、隔离进程页表、关闭 G 位等手段实现进程级的 Hook,从而规避全局影响。最后结合代码示例展示了 PTE Hook 的实战
For the latest discoveries in cyber research for the week of 6th October, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Red Hat has confirmed a cyber attack that resulted in unauthorized access to one of its GitLab instances. The attackers, Crimson Collective, claim to have stolen approximately 570GB of compressed data. The […]
The post 6th October – Threat Intelligence Report appeared first on Check Point Research.