Nice…I learned of a few new anti-debug techniques. Doesn’t Immunity’s !hidedebug option patch for these?
Nice, thanks. Unfortunately hidedebug doesn’t help here. 1. int3 : it is the debuggers way to set software breakpoints, so it’s a legitimate code. The debugger cannot determine if it is meant for sth. else – the debugger always thinks it’s a software breakpoint. 2. int 2D: since its exception value is used later to form the start address of the execption handler, there’s no way for patching too. For OllyDbg there is a plugin called StrongOD which claims to “correctly handle the instructions int 2d” but I’m not aware of if it can help in this case. I would say
Ok good to know…I’ll have to study this more closely in case I run into it in the field. Thanks again.