A deep dive into how Endpoint Detection and Response (EDR) products use user mode hooks in ntdll.dll to monitor process behavior, and how those hooks can be bypassed. Covers the fundamentals of Windows syscalls and the SSDT, explains how EDRs place jmp-based hooks in ntdll after PatchGuard eliminated SSDT hooking, then walks
Table of contents
A Trip Back In TimeWhat Is a SyscallEDRs and User Mode HookingBypassing EDR HooksThat’s All, For NowSort: