Hello,
I read thie post http://www.kernelmode.info/forum/viewto ... =14&t=1692 where the author writes that hooking of Win32k system call table is prohibited on Windows 5 (to be more precise: the Patchguard detects modifications of the driver).
I admit I did not expected this change because I had seen hooking of win32k.sys in quite many of well-known security software (Comodo, Kaspersky, Avast, Outpost, SandboxIE). It seems that this change will get them into a lot of troubles.
I tried to find some useful discussions about the topic, however, I did not find anything which would give me information I am looking for. I did not find any official statement what drivers and data structures exactly the Patchguard controls now.I did not see any new interfaces that would help the vendors to make their products equally functional without hooks in win32k.sys.
Do you know about any additional information about the topic?
Thanks in advance
I read thie post http://www.kernelmode.info/forum/viewto ... =14&t=1692 where the author writes that hooking of Win32k system call table is prohibited on Windows 5 (to be more precise: the Patchguard detects modifications of the driver).
I admit I did not expected this change because I had seen hooking of win32k.sys in quite many of well-known security software (Comodo, Kaspersky, Avast, Outpost, SandboxIE). It seems that this change will get them into a lot of troubles.
I tried to find some useful discussions about the topic, however, I did not find anything which would give me information I am looking for. I did not find any official statement what drivers and data structures exactly the Patchguard controls now.I did not see any new interfaces that would help the vendors to make their products equally functional without hooks in win32k.sys.
Do you know about any additional information about the topic?
Thanks in advance