Kernelland Hooking
Definition:
Kernelland hooking involves monitoring or modifying behavior at the kernel level using drivers, typically implemented via kernel-mode callbacks or by modifying system structures like the SSDT (System Service Dispatch Table).
Techniques:
SSDT Hooking: Intercepting system calls by modifying the SSDT to point to custom handlers.
Callback Registration: Using legitimate kernel APIs to register callbacks:
PsSetCreateProcessNotifyRoutine
PsSetLoadImageNotifyRoutine
CmRegisterCallback
Object Callbacks: Intercepting object operations with ObRegisterCallbacks.
Advantages:
Cannot be bypassed with simple userland techniques.
Deeper visibility into process/thread/image/registry activity.
Detects unusual kernel behavior or stealthy rootkits.
Limitations:
Requires signed kernel driver.
More difficult to deploy and maintain.
Vulnerable to advanced kernel-mode rootkits and driver exploitation.
Last updated