Conversation

Me and are happy to introduce HWSyscalls, a new method to execute indirect syscalls using Hardware Breakpoints without calling directly to ntdll.dll, therefore bypassing the current way to detect it. A detailed blog post will follow soon.
4
458
Wouldn’t it make even more sense to set eax to whatever index you want and then do a CALL with spoofed stack directly to the syscall instruction of some innocent looking stub in ntdll?
1
That's what this SysWhispers3 does I think, but could be I linked the wrong thing. So yes, that was my point, just modify the calling assembly to move the args and index for syscall calling convention.
2