A forum for reverse engineering, OS internals and malware analysis 

Forum for discussion about kernel-mode development.
 #28677  by flauteABC
 Tue Jun 14, 2016 2:56 pm
In latest Windows 10 updates Microsoft changed the win32k!W32pServiceTable very often and thus making win32k syscall hooks more tricky to set. Is there a way to get the indexes dynamically without using Symbols?
 #28683  by EP_X0FF
 Wed Jun 15, 2016 3:41 am
I never checked if it anyhow work. If you have shadow table addresses dump, then you can try to backtrace user32 call and looks if backtrace contain any of addresses from this table. Maybe this even doesn't work on modern NT, idk, try.
 #28800  by EP_X0FF
 Sat Jul 02, 2016 10:40 am
Starting from Win10 you can build complete shadow table using win32k.sys export W32pServiceTable and translating all it entries to corresponsing service names using win32k.sys import (win32k.sys imports them from win32kfull/win32base). No symbols required at all.