You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Apr 26, 2021. It is now read-only.
There are several reasons why monitoring was kept in userland. Kernelmode monitoring doesn't give as much granularity and flexibility in what we can do. Besides being an incredible hassle to maintain for multiple platforms in the long run.
For what it's worth, we won't replace usermode hooking with kernelmode. Perhaps make them complementary at most.
"Kernelmode monitoring doesn't give as much granularity and flexibility in what we can do".
Well, all NtXxxx APIs hooked in userland have their kernelmode equivalent with ZwXxxx.
I agree with the fact hooking SSDT isn't an easy task on multiple platforms, but the researcher can help a little bit on modern OSs with disabling patchguard. Not asking to replace the userland hooking but provide an option to choose a preferred way.
Hello
There's a fact, malware can easily detect cuckoo hooks, even with the DLL hidden.
Why not go deeper and do the analysis from kernel mode?
This is what zer0m0n does, why not integrate its development into cuckoo official repo?
https://github.com/conix-security/zer0m0n
The text was updated successfully, but these errors were encountered: