NHacker Next
  • new
  • past
  • show
  • ask
  • show
  • jobs
  • submit
Disabling kernel functions in your process (2009) (chadaustin.me)
unilynx 2 hours ago [-]
Cool solution, but I'd assume/hope Windows currently has sufficient memory protections to not allow applications to rewrite their own memory - especially if the function was already in a DLL to begin with and not JIT-generated code?
dwattttt 35 minutes ago [-]
As sibling notes, executable memory is not by default writable. If desired, you can also further disallow any executable memory to me allocated or modified by your process, even via the normal APIs, by calling SetProcessMitigationPolicy with ProcessDynamicCodePolicy.

https://learn.microsoft.com/en-us/windows/win32/api/processt...

TonyTrapp 1 hours ago [-]
Code segments are not writeble by default on Windows, like on any modern OS, but you can make any memory segment in your own process writable using VirtualProtect. That is not unique to Windows as well, on Linux you could achieve the same with mprotect.
Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
Rendered at 09:31:39 GMT+0000 (Coordinated Universal Time) with Vercel.