Extending Control, API Hooking
7 Pages Posted: 17 Apr 2018
Date Written: March 31, 2006
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as a launch platform for your shellcode and that the various system components are.
We will continue here with DLL injection before starting on API hooking. At this point we have learnt the basics of DLL injection and are ready to move onto applying it. This article will include a section on functions and calls, extending DLL injection and the n move to the actual API hooking process (that we will extend) in coming articles. When all of this is put together, we will have the foundations for creating shellcode for exploits and hence an understanding of the process that penetration testers and hacker s use in exploiting systems. With these skills, you will see how it is possible to either create your own exploit code from scratch or even to modify existing exploit code to either add functionality or in order to bypass signature based IDS/IPS filters.
This article continues a monthly series designed to take the reader from a novice to being able to create and deploy their own shellcode and exploits.
Suggested Citation: Suggested Citation