Binary Analysis
*Note: Email address will appear as "user domain ext" to prevent harvesting.
RE: Debugger Detection Functions May 24 2007 10:09PM
Aleksander P. Czarnowski (aleksander czarnowski avet com pl)
This is great example of very short and simple question which rises long
and complex answer.
First of all you need to dived debugger detection into 2 areas: user
mode and kernel (ring0) ones. Secondly some tricks will not work on
certain lines of systems - for example detection procedures will look...

[ more ]  

Privacy Statement
Copyright 2010, SecurityFocus