hi
reading about ZAccess driver, on http://resources.infosecinstitute.com/z ... h-rootkit/
I have a question about basic concept!
as it is mentioned there and we see in other drivers, all happens in DriverEntry routine...but I can't understand how!
DriverEntry has an argument which is Driver Obj, which I think to be its own (?), but it seems that malicious drivers needs an other driver obj! as an input in their
EriverEntry...there is no sign of finding other Obj before hooks in the driverEntry...it does not hook itself, does it? ;)
can any one explaine me more?
thanks
reading about ZAccess driver, on http://resources.infosecinstitute.com/z ... h-rootkit/
I have a question about basic concept!
as it is mentioned there and we see in other drivers, all happens in DriverEntry routine...but I can't understand how!
DriverEntry has an argument which is Driver Obj, which I think to be its own (?), but it seems that malicious drivers needs an other driver obj! as an input in their
EriverEntry...there is no sign of finding other Obj before hooks in the driverEntry...it does not hook itself, does it? ;)
can any one explaine me more?
thanks