3. API Hooking
https://github.com/Kara-4search/FullDLLUnhooking_CSharp
https://www.ired.team/offensive-security/defense-evasion/detecting-hooked-syscall-functions
API Hooking - Introduction
BLUF
API hooking is a technique used to intercept and modify the behavior of an API function. It is commonly used for:
- Debugging
- Reverse Engineering
- Game Cheating
- Malware Development (e.g., bypassing security measures)
API hooking replaces an original API function with a custom version that executes additional actions before or after calling the original function. This allows modification of a program's behavior without altering its source code.
API function hook flow
From https://www.lrqa.com/en/cyber-labs/windows-inline-function-hooking/

- A piece of redirection code overwrites part of the target function which will redirect any calls to it, into a callback function in our code
- The callback is the second part and informs us that the target function was called. This is the main part of the hook; the part that allows us to change the behaviour of the target function or log the information passed into the target function.
- The final part is commonly called a trampoline, since it bounces us back into the target function, as if nothing ever happened. The trampoline is created by the hooking code and holds a copy of part of the hooked function we overwrote initially. The trampoline also contains some code to redirect execution back into to the hooked function just after the code we overwrote.
Hooking Method | Description |
---|---|
Trampolines | Injects shellcode at the start of a function to redirect execution to another address. |
Inline Hooking | Modifies function execution in-place, allowing the function to return to normal execution afterward. More efficient but harder to maintain. |
Why API Hooking?
API Hooking is useful in both security and offensive contexts:
Use Case | Description |
---|---|
Gather Data | Extract sensitive information like credentials from hooked API calls. |
Intercept Calls | Modify or alter API functions to change application behavior. |
Bypass Security | Disable or evade protections like AMSI, ETW, or AV hooks. |
Implementing API Hooking
Method | Description |
---|---|
Detours Library | Microsoft's open-source library for API hooking. |
MinHook | A lightweight open-source library for inline hooking. |
Windows APIs | Some Windows APIs support limited API hooking functionality. |
Custom Hooking | Manually implementing hooks to reduce signatures and IoCs. |