Pcapy

Capture network packets from your Python programs on UNIX and Windows platforms

    Impacket

Easily dissect and build network protocols in object—oriented Python

    InlineEgg

A platform independent toolbox for writing assembly code in Python

    UHooker

A tool to intercept and manipulate execution of programs. It enables the user to insert hooks in function calls and arbitrary addresses within the executable file in memory. The hooks handlers are written in Python and can be changed at runtime without the need to restart the inspected process.

    MSyslog

A replacement for the traditional syslog daemon featuring cryptographic log protection, database backends, and more



What is uhooker?

 

The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory.

Why is it 'Universal'? There are different ways of hooking functions in a program, for example, it can be done by setting software breakpoints (int 3h), hardware breakpoints (cpu regs), or overwriting the prologue of a function to jump to a 'stub', etc. All the methods mentioned required above, specially the latter, require the programmer of the code creating the hook to have certain knowledge of the function it is intercepting. If the code is written in a programming language like C/C++, the code will normally need to be recompiled for every function one wants to intercept, etc.

The Universal Hooker tries to create very simple abstractions that allow a user of the tool to write hooks for different API and non-API functions using an interpreted language (python), without the need to compile anything, and with the possibility of changing the code that gets executed whent the hooked function is called in run-time.

The Universal Hooker builds on the idea that the function handling the hook is the one with the knowledge about the parameters type of the function it is handling. The Universal Hooker only knows the number of parameters of the function, and obtains them from the stack (all DWORDS). The hook handler is the one that will interpret those DWORDS as the types received by the function.

The hook handlers are written in python, what eliminates the need for recompiling the handlers when a modification is required. And also, the hook handlers (executed by the server) are reloaded from disk every time a hook handler is called, this means that one can change the behavior of the hook handler without the need to recompile the code, or having to restart the application being analyzed.

Win32 binaries


Setup


Quick start:
Download the .zip file and extract to the ollydbg directory. The uhooker.dll must be in the ollydbg directory for it to be loaded as a plugin. and that's it!. Make sure that .py files in windows are associated with the python interpreter. For example, if you have a .py file and type 'myfile.py' and press enter on a cmd.exe window and it doesn't run, the association is not configured correctly.

Requirements

Documentation

Click the following link for an online copy of the documentation and scripts to be used with the uhooker. This page also contains an API reference and sample scripts that are frequently updated.

 

Known issues

Sometimes it does not work.

 

Licensing

This software is provided under the following license for non-commercial use.

 

Contact Us

Whether you want to report a bug, send a patch or give some suggestions on this package, drop us a few lines at oss@coresecurity.com . To contact me, the author, you can reach me at hochoa[ a t ]coresecurity.com

 

 

Core Security Technologies © 1998-2006  |  All rights reserved