D-Jester
August 13th, 2008, 14:21
IDA Stealth is a plugin which aims to hide the IDA debugger from most common anti-debugging techniques.
The plugin is composed of two files, the plugin itself and a dll which is injected into the debuggee as soon as the debugger attaches to the process. The injected dll actually implements most of the stealth techniques either by hooking system calls or by patching some flags in the remote process.
Installation
To install the plugin, copy both files to the plugins directory of your IDA installation. Make sure, that the cfg subdirectory is writable, because that's where the plugin stores its configuration.
If you find bugs or want to suggest new stealth techniques just drop me a mail or create a new forum topic.
Changelog
07/24/2008 - v1.0 Beta 1
* Bugfix: Multiple minor bugfixes
* Added: Fake OS version
* Added: Disable NtTerminateThread/NtTerminateProcess
07/14/2008 - v1.0 Alpha 4
* Bugfix: Injection of stealth dll could fail in some cases (see N-InjectLib)
07/13/2008 - v1.0 Alpha 3
* Added: Multiple stealth techniques (OpenProcess, DBG_PRINTEXCEPTION, hardware breakpoint protection, hide IDA process and windows, to name but a few)
* Improved: Overall stealth: xADT as well as Extreme Debugger Detector 0.5 are unable to detect an attached debugger (except for RDTSC based tests and scanning the HDD for various tools)
* Bugfix: Plugin didn't correctly de-register from debug callback; crashed with newly created databases
07/06/2008 - v1.0 Alpha 2
* Bugfix: Injection of stealth dll failed if IMAGE_DIRECTORY_ENTRY_IAT of process was zero, so the plugin didn't work with most packed executables
* Bugfix: NtQueryInformationProcess didn't work (CheckRemoteDebuggerPresent was implicitly affected)
07/04/2008 - v1.0 Alpha
* First alpha release, some features still missing, needs testing, major bugs
* Known Bugs:
o Problems when modifying import directory of packed executables (error 0xC000007B)
http://newgre.net/idastealth
The plugin is composed of two files, the plugin itself and a dll which is injected into the debuggee as soon as the debugger attaches to the process. The injected dll actually implements most of the stealth techniques either by hooking system calls or by patching some flags in the remote process.
Installation
To install the plugin, copy both files to the plugins directory of your IDA installation. Make sure, that the cfg subdirectory is writable, because that's where the plugin stores its configuration.
If you find bugs or want to suggest new stealth techniques just drop me a mail or create a new forum topic.
Changelog
07/24/2008 - v1.0 Beta 1
* Bugfix: Multiple minor bugfixes
* Added: Fake OS version
* Added: Disable NtTerminateThread/NtTerminateProcess
07/14/2008 - v1.0 Alpha 4
* Bugfix: Injection of stealth dll could fail in some cases (see N-InjectLib)
07/13/2008 - v1.0 Alpha 3
* Added: Multiple stealth techniques (OpenProcess, DBG_PRINTEXCEPTION, hardware breakpoint protection, hide IDA process and windows, to name but a few)
* Improved: Overall stealth: xADT as well as Extreme Debugger Detector 0.5 are unable to detect an attached debugger (except for RDTSC based tests and scanning the HDD for various tools)
* Bugfix: Plugin didn't correctly de-register from debug callback; crashed with newly created databases
07/06/2008 - v1.0 Alpha 2
* Bugfix: Injection of stealth dll failed if IMAGE_DIRECTORY_ENTRY_IAT of process was zero, so the plugin didn't work with most packed executables
* Bugfix: NtQueryInformationProcess didn't work (CheckRemoteDebuggerPresent was implicitly affected)
07/04/2008 - v1.0 Alpha
* First alpha release, some features still missing, needs testing, major bugs
* Known Bugs:
o Problems when modifying import directory of packed executables (error 0xC000007B)
http://newgre.net/idastealth