Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Technique to execute machine code directly use API


labyrinthos

Recommended Posts

By using some of the functions in the Win32 API, it is intended to inform a convenient technique that can be used to run the machine code of the byte array directly. Of course, in a general programming, but you do not need to run the machine language code directly, in the high-speed processing programming and system development, it is necessary elements almost mandatory. :D

 

 

The following is a sample to get the kernel address of IDT table that contains the address of x86 Interrupt handler by executing the SIDT instruction. SIDT (Store IDTR to Memory) command, because it is a command that can be executed in Ring3 (user mode), is that it works correctly.

 

 

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.