Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Creating Trampolines and Re-Obfuscating Function Pointers in Runtime Linking - Part 7

Dr Josh Stroschein via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a 30-minute technical video exploring advanced runtime linking techniques, focusing on trampoline creation and function pointer manipulation in malware analysis. Learn how trampolines are constructed, function pointers are resolved and re-obfuscated, and examine heap memory debugging using the 0xABABABAB pattern. Follow along through key topics including import table locations, precomputed values, DLL loading, memory allocation, random number generation, and trampoline code implementation. Gain practical insights into reverse engineering and malware analysis through detailed explanations and a concrete example function call demonstration.

Syllabus

Starting with the function that creates the trampolines
Location of the new import table
Concerning precomputed values
Typing arguments
Loading the required DLLs
Debugging
Preparing to store function pointers
Getting the desired function pointer
Allocating new memory
Checking memory for padding bytes 0xABABABAB
Basis for the trampoline
Generating random numbers
Adding code to the trampoline
Example function call
Wrapping up and recap

Taught by

Dr Josh Stroschein

Reviews

Start your review of Creating Trampolines and Re-Obfuscating Function Pointers in Runtime Linking - Part 7

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.