I already saw in several Questions/Answers in some foruns that says that not is possible write to any SSDT tables no Windows x64 here, are some:
* Hook ZwTerminateProcess in x64 Driver (Without SSDT)
* Is there a kernel-mode callback for LdrLoadDll?
* Kernel Patch Protection
-----------------------------------------------------------------------------------------------------------------------------------------------------------------
Already in others places i saw that is used a "bypasser" on KPP, here are one:
* What is PatchGuard?
Then based in these diferents versions of facts, what is really what antivirus software developers make to write on SSDT tables on Win x64 with success without any lock by KPP? How they are able to this really?
I think that this is a question that many kernel developers want know, how this happens truly. :)
Thx :D
* Hook ZwTerminateProcess in x64 Driver (Without SSDT)
* Is there a kernel-mode callback for LdrLoadDll?
* Kernel Patch Protection
-----------------------------------------------------------------------------------------------------------------------------------------------------------------
Already in others places i saw that is used a "bypasser" on KPP, here are one:
* What is PatchGuard?
Then based in these diferents versions of facts, what is really what antivirus software developers make to write on SSDT tables on Win x64 with success without any lock by KPP? How they are able to this really?
I think that this is a question that many kernel developers want know, how this happens truly. :)
Thx :D