Comment by athrowaway3z 14 days ago I'd never heard of detour. That's a pretty cool hack. 4 comments athrowaway3z Reply ckbkr10 14 days ago they were prominent in game hacking 2005ish windowsmade hooking into game code much easier than before sidewndr46 13 days ago Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory leeter 13 days ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... 1 reply →
ckbkr10 14 days ago they were prominent in game hacking 2005ish windowsmade hooking into game code much easier than before sidewndr46 13 days ago Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory leeter 13 days ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... 1 reply →
sidewndr46 13 days ago Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory leeter 13 days ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... 1 reply →
leeter 13 days ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... 1 reply →
they were prominent in game hacking 2005ish windows
made hooking into game code much easier than before
Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory
I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).
[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...
[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10...
1 reply →