• <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>

            S.l.e!ep.¢%

            像打了激速一樣,以四倍的速度運(yùn)轉(zhuǎn),開心的工作
            簡(jiǎn)單、開放、平等的公司文化;尊重個(gè)性、自由與個(gè)人價(jià)值;
            posts - 1098, comments - 335, trackbacks - 0, articles - 1
              C++博客 :: 首頁(yè) :: 新隨筆 :: 聯(lián)系 :: 聚合  :: 管理
            HOOK是一種WINDOWS下存在很久的技術(shù)了。?
            HOOK一般分兩種1。HOOK?MESSAGE??2。HOOK?API?本問討論的是HOOK?API。(如果你是HOOK高手就不要看了)?
            在最初學(xué)HOOK-API的時(shí)候通常都是通過覆蓋地址和修改IAT的方法。
            通過這兩種技術(shù),我們基本都可以實(shí)現(xiàn)對(duì)本進(jìn)程的API函數(shù)進(jìn)行HOOK了。但是在高興之余會(huì)有點(diǎn)遺憾,
            怎么才能HOOK其他進(jìn)程的API函數(shù)呢?怎么才能對(duì)一個(gè)API函數(shù)進(jìn)行全局的HOOK呢?
            下面是我的一個(gè)簡(jiǎn)單的“HOOK其他進(jìn)程API函數(shù)”的實(shí)現(xiàn)。(對(duì)另一進(jìn)程的MessageBoxA這個(gè)函數(shù)進(jìn)行HOOK)?

            其實(shí)里面的應(yīng)用了兩個(gè)技術(shù)
            1。遠(yuǎn)程線程注入?
            2。修改IAT,HOOK-API

            好了貼出代碼如下:
            一共是3個(gè)文件
            install.c??注入程序?
            fundll.cpp??DLL程序?
            test.cpp??測(cè)試程序??

            CODE:

            //-------------------------install.c--------------------------
            //
            //install.c

            #include?"windows.h"
            #include?"tlhelp32.h"

            #pragma?comment(lib,"th32.lib")

            const?char?*pkill="fundll.dll";????????????????//DLL文件的路徑

            //這個(gè)路徑很有意思,這個(gè)路徑是相對(duì)于目標(biāo)進(jìn)程的,而不是自身進(jìn)程。
            //所以要嘛寫成絕對(duì)路徑,要嘛寫成相對(duì)于目標(biāo)進(jìn)程的相對(duì)路徑。
            //如果寫成相對(duì)于自身的路徑就要麻煩了,本程序就找不到DLL文件了。?

            char?*prosess="test.exe";???//要注入的進(jìn)程名(目標(biāo)進(jìn)程名)

            int?main()
            {
            ????????HANDLE?hSnap;
            ????????HANDLE?hkernel32;????????//被注入進(jìn)程的句柄
            ????????PROCESSENTRY32?pe;?
            ????????BOOL?bNext;
            ????????HANDLE?hToken;
            ????????TOKEN_PRIVILEGES?tp;
            ????????LUID?Luid;
            ????????LPVOID?p;
            ????????FARPROC?pfn;

            ????????if?(!OpenProcessToken(GetCurrentProcess(),TOKEN_ADJUST_PRIVILEGES|TOKEN_QUERY,&hToken))
            ????????{
            ????????????????return?1;
            ????????}

            ????????if?(!LookupPrivilegeValue(NULL,SE_DEBUG_NAME,&Luid))
            ????????{
            ????????????????return?1;
            ????????}

            ????????tp.PrivilegeCount?=?1;
            ????????tp.Privileges[0].Attributes?=?SE_PRIVILEGE_ENABLED;
            ????????tp.Privileges[0].Luid?=?Luid;

            ????????if?(!AdjustTokenPrivileges(hToken,0,&tp,sizeof(TOKEN_PRIVILEGES),NULL,NULL))
            ????????{
            ????????????????return?1;
            ????????}

            ????????pe.dwSize?=?sizeof(pe);
            ????????hSnap=CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS,?0);
            ????????bNext=Process32First(hSnap,?&pe);?
            ????????while(bNext)?
            ????????{
            ????????????????if(!stricmp(pe.szExeFile,prosess))????????????????//--->>
            ????????????????{
            ????????????????????????hkernel32=OpenProcess(PROCESS_CREATE_THREAD|PROCESS_VM_WRITE|PROCESS_VM_OPERATION,1,pe.th32ProcessID);
            ????????????????????????break;
            ????????????????}
            ????????????????bNext=Process32Next(hSnap,?&pe);?
            ????????}

            ????????CloseHandle(hSnap);



            ????????p=VirtualAllocEx(hkernel32,NULL,strlen(pkill),MEM_COMMIT,PAGE_READWRITE);
            ????????WriteProcessMemory(hkernel32,p,pkill,strlen(pkill),NULL);
            ????????pfn=GetProcAddress(GetModuleHandle("kernel32.dll"),"LoadLibraryA");
            ????????CreateRemoteThread(hkernel32,NULL,0,pfn,p,NULL,0);?

            ????????return?0;
            }


            //----------------------fundll.cpp-----------------------------
            //
            //fundll.cpp

            #include?"windows.h"
            #include?"process.h"
            #include?"tlhelp32.h"
            #include?"stdio.h"

            #pragma?comment(lib,"th32.lib")

            PIMAGE_DOS_HEADER??pDosHeader;
            PIMAGE_NT_HEADERS??pNTHeaders;
            PIMAGE_OPTIONAL_HEADER???pOptHeader;
            PIMAGE_IMPORT_DESCRIPTOR??pImportDescriptor;
            PIMAGE_THUNK_DATA?????????pThunkData;
            PIMAGE_IMPORT_BY_NAME?????pImportByName;
            HMODULE?hMod;


            //?定義MessageBoxA函數(shù)原型
            typedef?int?(WINAPI?*PFNMESSAGEBOX)(HWND,?LPCSTR,?LPCSTR,?UINT?uType);
            int?WINAPI?MessageBoxProxy(IN?HWND?hWnd,?IN?LPCSTR?lpText,?IN?LPCSTR?lpCaption,?IN?UINT?uType);

            int?*?addr?=?(int?*)MessageBoxA;????????//保存函數(shù)的入口地址
            int?*?myaddr?=?(int?*)MessageBoxProxy;


            void?ThreadProc(void?*param);//線程函數(shù)

            //-------------------------------------------------------主函數(shù)開始

            BOOL?WINAPI?DllMain(HINSTANCE?hinstDLL,DWORD?fdwReason,LPVOID?lpvReserved)
            {
            ????????if(fdwReason==DLL_PROCESS_ATTACH)????????
            ????????????????_beginthread(ThreadProc,0,NULL);????????

            ????????return?TRUE;?
            }


            //結(jié)束進(jìn)程的函數(shù)

            void?ThreadProc(void?*param)
            {
            ????????//------------hook?api----------------
            ????????hMod?=?GetModuleHandle(NULL);

            ????????pDosHeader?=?(PIMAGE_DOS_HEADER)hMod;
            ????????pNTHeaders?=?(PIMAGE_NT_HEADERS)((BYTE?*)hMod?+?pDosHeader->e_lfanew);
            ????????pOptHeader?=?(PIMAGE_OPTIONAL_HEADER)&(pNTHeaders->OptionalHeader);

            ????????pImportDescriptor?=?(PIMAGE_IMPORT_DESCRIPTOR)((BYTE?*)hMod?+?pOptHeader->DataDirectory[1].VirtualAddress);

            ????????while(pImportDescriptor->FirstThunk)
            ????????{
            ????????????????char?*?dllname?=?(char?*)((BYTE?*)hMod?+?pImportDescriptor->Name);

            ????????????????pThunkData?=?(PIMAGE_THUNK_DATA)((BYTE?*)hMod?+?pImportDescriptor->OriginalFirstThunk);

            ????????????????int?no?=?1;
            ????????????????while(pThunkData->u1.Function)
            ????????????????{
            ????????????????????????char?*?funname?=?(char?*)((BYTE?*)hMod?+?(DWORD)pThunkData->u1.AddressOfData?+?2);
            ????????????????????????PDWORD?lpAddr?=?(DWORD?*)((BYTE?*)hMod?+?(DWORD)pImportDescriptor->FirstThunk)?+(no-1);
            ????????????????
            ????????????????????????//修改內(nèi)存的部分
            ????????????????????????if((*lpAddr)?==?(int)addr)
            ????????????????????????{
            ????????????????????????????????//修改內(nèi)存頁(yè)的屬性
            ????????????????????????????????DWORD?dwOLD;
            ????????????????????????????????MEMORY_BASIC_INFORMATION??mbi;
            ????????????????????????????????VirtualQuery(lpAddr,&mbi,sizeof(mbi));
            ????????????????????????????????VirtualProtect(lpAddr,sizeof(DWORD),PAGE_READWRITE,&dwOLD);
            ????????????????????????????????
            ????????????????????????????????WriteProcessMemory(GetCurrentProcess(),?
            ????????????????????????????????????????????????lpAddr,?&myaddr,?sizeof(DWORD),?NULL);
            ????????????????????????????????//恢復(fù)內(nèi)存頁(yè)的屬性
            ????????????????????????????????VirtualProtect(lpAddr,sizeof(DWORD),dwOLD,0);
            ????????????????????????}
            ????????????//---------
            ????????????????????????no++;
            ????????????????????????pThunkData++;
            ????????????????}

            ????????????????pImportDescriptor++;
            ????????}
            ????????//-------------------HOOK?END-----------------
            }

            //new?messagebox?function
            int?WINAPI?MessageBoxProxy(IN?HWND?hWnd,?IN?LPCSTR?lpText,?IN?LPCSTR?lpCaption,?IN?UINT?uType)
            {
            ????????return?????????((PFNMESSAGEBOX)addr)(NULL,?"gxter_test",?"gxter_title",?0);
            ????????//這個(gè)地方可以寫出對(duì)這個(gè)API函數(shù)的處理代碼
            }


            //----------------------------test.cpp------------------------------------
            //test.cpp

            #include?"stdio.h"
            #include?"windows.h"

            int?main()
            {
            ????????printf("test---\n");
            ????????while(1)
            ????????{
            ????????????????getchar();
            ????????????????MessageBoxA(NULL,?"原函數(shù)",?"09HookDemo",?0);
            ????????}
            ????????return?0;
            }



            測(cè)試過程:先運(yùn)行TEST不要關(guān)閉(建立目標(biāo)),再運(yùn)行install(進(jìn)行注入)。但要注意FUNDLL和TEST文件位置。?

            上面的代碼進(jìn)本上就實(shí)現(xiàn)了對(duì)其他進(jìn)程的API進(jìn)行HOOK了。
            但還有一個(gè)問題就是對(duì)“API函數(shù)進(jìn)行全局的HOOK”。我的想法就是注入所有進(jìn)程就可以實(shí)現(xiàn)了。
            只要簡(jiǎn)單的改一下上面的代碼就可以實(shí)現(xiàn)了。?這好象有點(diǎn)像SetWindowsHookEx這個(gè)函數(shù)的的實(shí)現(xiàn)過程。
            以上就是我想法了,如果在什么地方有錯(cuò)誤還請(qǐng)糾正。?


            參考資料:
            《WINDOWS?程序設(shè)計(jì)》
            《WINDOWS?核心編程》

            9久久9久久精品| 久久这里只有精品首页| 青青青伊人色综合久久| 91久久国产视频| 久久激情五月丁香伊人| 一本一道久久a久久精品综合 | 国产韩国精品一区二区三区久久| 国产精品99久久99久久久| 国产免费福利体检区久久| 亚洲精品99久久久久中文字幕| 国产A三级久久精品| 久久精品国产福利国产秒| 日韩久久无码免费毛片软件 | 午夜欧美精品久久久久久久| 久久国产精品99久久久久久老狼| 久久久久99精品成人片三人毛片| 香蕉久久夜色精品升级完成| 久久精品视频91| 国产三级久久久精品麻豆三级| 久久久久无码国产精品不卡| 久久精品黄AA片一区二区三区| 久久精品国产欧美日韩| 精品无码久久久久久尤物| 久久综合亚洲色HEZYO国产| 久久大香香蕉国产| 亚洲va久久久久| 国产成人综合久久久久久| 精品久久久久久国产| 久久亚洲国产精品123区| 久久久久久久人妻无码中文字幕爆| 久久久久国产亚洲AV麻豆| 久久精品草草草| 久久香蕉国产线看观看精品yw| 一本久久a久久精品综合香蕉| 婷婷综合久久狠狠色99h| 久久婷婷五月综合色高清| 伊人热热久久原色播放www| 91精品国产91久久久久久青草| 久久精品国产亚洲AV高清热| 亚洲乱码中文字幕久久孕妇黑人| 亚洲午夜精品久久久久久app|