Skip to content
/ Anchor Public

Injectable DLL that sets hardware breakpoints on NT functions

License

Notifications You must be signed in to change notification settings

r0keb/Anchor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Anchor

About

Injectable DLL that sets hardware breakpoints on NT functions.

Functionality

  • Once injected, the DLL sets hardware breakpoints on NT functions.
  • After any of the hooked functions are called, the execution flow is redirected to the "malicious code", which displays a MessageBox for the proof of concept (POC).
  • After executing our code, the hardware breakpoints are cleaned up, and the process continues normally. (I chose to execute the custom code only once for the POC, but this can be modified.)

Disclaimer

  • The code lacks operational security (opsec) measures (e.g., no removal of CRT libraries, no indirect syscalls, no API hashing). This is because the primary goal was to explore hardware breakpoint hooking on a remote process.
  • A DLL injector is included:
    • The code is not commented (as it is in Archor), as it is not the main focus of this repository.
    • It is a rudimentary injector, but again, this is not the main focus.

Preview

Here is a preview of how it works:

  1. First, choose the target process (in this case, "notepad.exe") and load the DLL into it. (You can use DllInjector or any other injector you prefer) Image1

  2. Target process and the dll loaded. Image2

  3. Triggering the hardware breakpoint... Image3

  4. Done! The code has been executed, and the process continues running normally. Image4

Credits

About

Injectable DLL that sets hardware breakpoints on NT functions

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages