SSDT Hook Detector
User-mode tool that reads the SSDT from kernel memory and detects hooked syscalls by comparing function pointers against ntoskrnl.exe's expected base range.
Overview
A user-mode utility that detects SSDT hooks installed by rootkits or anti-cheat software. It reads the System Service Descriptor Table from kernel memory via a custom driver and compares each entry against the expected address range of ntoskrnl.exe.
How It Works
- Loads a signed kernel driver that exposes an IOCTL interface
- Reads
KeServiceDescriptorTablepointer from driver context - Iterates all syscall entries and checks if the address falls within ntoskrnl’s
.textsection - Reports hooked entries with the hook address and closest known symbol
Detection Scope
- Direct SSDT inline hooks
- SSDT pointer replacement (table swap)
- Partial hooked ranges in third-party modules