Hey, I'm making a small part of code that disassemble the first bytes of the EAT/IAT of modules of a loaded process. Nothing new here.
I got a problem with function pointer, because most of the time it's a pointer to a real assembly code, and sometimes it's a pointer to a location in the virtual table.
The main problem is my program tries to disassemble the first bytes, whatever they are, and sometimes those vtable address looks like JMP or CALL statements, raising a flag for inline hook.
How can I do to define the range of the vtable (and thus treat those address as address pointers instead of code) in the loaded module ?
Cheers,
EDIT: Here's what it looks like in IDA
I got a problem with function pointer, because most of the time it's a pointer to a real assembly code, and sometimes it's a pointer to a location in the virtual table.
The main problem is my program tries to disassemble the first bytes, whatever they are, and sometimes those vtable address looks like JMP or CALL statements, raising a flag for inline hook.
How can I do to define the range of the vtable (and thus treat those address as address pointers instead of code) in the loaded module ?
Cheers,
EDIT: Here's what it looks like in IDA