#ifndef _NTRTL_H
#if (PHNT_VERSION >= PHNT_WINDOWS_10_20H1)
NTSYSAPI
ULONG_PTR
NTAPI
RtlGetReturnAddressHijackTarget(
VOID
);
View code on GitHubULONG_PTR
RtlGetReturnAddressHijackTarget (
VOID
)
View the official Win32 development documentationNo description available.
Gets the address of the function that's used for the OS-supported return address hijacking. When user-mode wants to perform such a hijack, it overwrites a return address on the stack with said address.
None.
The address that's used to perform an OS-supported return address hijack.
This function has no associated import library or header file; you must call it using the LoadLibrary and GetProcAddress functions.
| Requirement | Value |
|---|---|
| Minimum supported client | Windows 10 Build 19041 |
| DLL | Ntdll.dll |