Here it goes. A detailed blog on proxying your DLL loads and hiding the original callstack from userland hooks/ETW with a new set of undocumented API and some hacky tricks. Code is on my Github repository. This one was a brain buster 🔥
0xdarkvortex.dev/proxying-dll-l
Conversation
Maybe you should read some msdn docs instead of arrogantly shouting what you dont understand
1
1
More RTFM for you
"_chkstk() increases the stack when needed by committing some of the pages previously reserved for the stack. If there is no more physical memory available for committed pages, _chkstk fails"
1
1
"When you enter a function (VC++ with the stack checking enabled), it will call the _chkstk located in CHKSTK.ASM. This function does a stack page probing and causes the necessary pages of memory to be allocated using the guard page scheme, if possible."
1
1
The doc literally says "_chkstk() increases the stack when needed by committing some of the pages previously reserved for the stack". How did you miss that?
3
1
Show replies

