A forum for reverse engineering, OS internals and malware analysis 

Discussion on reverse-engineering and debugging.
 #10994  by whoreTex
 Fri Jan 13, 2012 7:12 am
Hello!

Im wondering whats the best way of preventing runtime patching?

I've considered hooking NtWriteProcessMemory system-wide, but that would most likely not be apprichiated by the users of my software and it's easily bypassable aswell, does anyone have other suggestion?
 #11001  by EP_X0FF
 Fri Jan 13, 2012 2:56 pm
whoreTex wrote:Hello!

Im wondering whats the best way of preventing runtime patching?

I've considered hooking NtWriteProcessMemory system-wide, but that would most likely not be apprichiated by the users of my software and it's easily bypassable aswell, does anyone have other suggestion?
Game protection? x64 support?
 #11013  by everdox
 Fri Jan 13, 2012 7:26 pm
if you are talking ring 0 on x64 then aside from DKOM stuff I don't think you have a great deal of options. then again I'm not sure how patchguard itself reacts to all DKOM methods. <-- maybe someone can confirm that.

maybe instead of preventing you could work a system to detect and then react to runtime patching.
 #11075  by whoreTex
 Tue Jan 17, 2012 5:40 am
Hi

I forgot the mention that it's in ring3 only and only x86 system and it's not about game protection
 #11080  by rkhunter
 Tue Jan 17, 2012 6:37 am
Seems protect yourself from ring 3 this is not good idea because for full control you need injects into other processes and actually disrupt their work.