HyperHide 可以过VMP强壳

HyperHide 可以过VMP强壳

1、注意事项

  • 虚拟机要开启VT模式

image

这个不开的下场就是有一个sys驱动文件会启动不了。

  • 准备好工具,debugView

  • 官方使用的是 al-khaser 但是我们使用debugVinew

  • 因该驱动无签名所以要在测试模式下运行。

      在Cmd中运行:bcdedit /set testsigning on 随后重启电脑
    
      注意观察桌面右下角提示,提示为测试模式已开启才可以
    

2、HyperHide下载安装加配置

HyperHide 官方下载即可

官方Github链接:链接直达

release 界面下载最新版据说可以过3.81强壳。

image

下载解压好后如图:

image

首先,要记得修改Scripts中Create中路径问题。

在这里直接将路径修改为本地两个驱动的路径就好(中文路径没有尝试过),官方原版是指向的drives路径,这里记得复制一下。

随后直接以管理员方式启动Script路径下create.bat文件。

image

这里我是已经启动了,会弹出这个,第一次驱动会是服务启动成功。

然后再以管理员身份运行on.bat即可

image

下一步将,

HyperHide.ini 与 HyperHide.dp64 拷贝到X64的插件文件夹中即可。

初始打开的时候,。会提示这样。

image

但是VMP一般不能启动调试,还是要附加的方式来

所以将Current改为:Default Attach

即可解决该问题。AI-Khaser输出如下:

[al-khaser version 0.82]
-------------------------[Initialisation]-------------------------

[*] You are running: Microsoft Windows 10  (build 19045) 64-bit
[*] All APIs present and accounted for.

-------------------------[TLS Callbacks]-------------------------
[*] TLS process attach callback                                                                    [ GOOD ]
[*] TLS thread attach callback                                                                     [ GOOD ]

-------------------------[Debugger Detection]-------------------------
[*] Checking IsDebuggerPresent API                                                                 [ GOOD ]
[*] Checking PEB.BeingDebugged                                                                     [ GOOD ]
[*] Checking CheckRemoteDebuggerPresent API                                                        [ GOOD ]
[*] Checking PEB.NtGlobalFlag                                                                      [ BAD  ]
[*] Checking ProcessHeap.Flags                                                                     [ BAD  ]
[*] Checking ProcessHeap.ForceFlags                                                                [ BAD  ]
[*] Checking Low Fragmentation Heap                                                                [ GOOD ]
[*] Checking NtQueryInformationProcess with ProcessDebugPort                                       [ GOOD ]
[*] Checking NtQueryInformationProcess with ProcessDebugFlags                                      [ GOOD ]
[*] Checking NtQueryInformationProcess with ProcessDebugObject                                     [ GOOD ]
[*] Checking WudfIsAnyDebuggerPresent API                                                          [ GOOD ]
[*] Checking WudfIsKernelDebuggerPresent API                                                       [ GOOD ]
[*] Checking WudfIsUserDebuggerPresent API                                                         [ GOOD ]
[*] Checking NtSetInformationThread with ThreadHideFromDebugger                                    [ GOOD ]
[*] Checking CloseHandle with an invalide handle                                                   [ GOOD ]
[*] Checking NtSystemDebugControl                                                                  [ GOOD ]
[*] Checking UnhandledExcepFilterTest                                                              [ GOOD ]
[*] Checking OutputDebugString                                                                     [ GOOD ]
[*] Checking Hardware Breakpoints                                                                  [ GOOD ]
[*] Checking Software Breakpoints                                                                  [ GOOD ]
[*] Checking Interupt 0x2d                                                                         [ GOOD ]
[*] Checking Interupt 1                                                                            [ GOOD ]
[*] Checking trap flag                                                                             [ GOOD ]
[*] Checking Memory Breakpoints PAGE GUARD                                                         [ GOOD ]
[*] Checking If Parent Process is explorer.exe                                                     [ GOOD ]
[*] Checking SeDebugPrivilege                                                                      [ GOOD ]
[*] Checking NtQueryObject with ObjectTypeInformation                                              [ GOOD ]
[*] Checking NtQueryObject with ObjectAllTypesInformation                                          [ GOOD ]
[*] Checking NtYieldExecution                                                                      [ BAD  ]
[*] Checking CloseHandle protected handle trick                                                    [ GOOD ]
[*] Checking NtQuerySystemInformation with SystemKernelDebuggerInformation                         [ GOOD ]
[*] Checking SharedUserData->KdDebuggerEnabled                                                     [ GOOD ]
[*] Checking if process is in a job                                                                [ GOOD ]
[*] Checking VirtualAlloc write watch (buffer only)                                                [ GOOD ]
[*] Checking VirtualAlloc write watch (API calls)                                                  [ GOOD ]
[*] Checking VirtualAlloc write watch (IsDebuggerPresent)                                          [ GOOD ]
[*] Checking VirtualAlloc write watch (code write)                                                 [ GOOD ]
[*] Checking for page exception breakpoints                                                        [ GOOD ]
[*] Checking for API hooks outside module bounds                                                   [ GOOD ]

DebugView显示如下:(直接监视了所有消息)

image

附加程序随时暂停:

image

最后:

注意系统更新那么多,要不然会有更多的问题,其次要再虚拟机运行,一天能蹦好多次

posted @ 2025-07-25 14:11  未然king  阅读(304)  评论(1)    收藏  举报