首页
社区
课程
招聘
[旧帖] [原创]createprocess hook dll 执行exe中的函数. 0.00雪花
发表于: 2008-2-17 12:39 14788

[旧帖] [原创]createprocess hook dll 执行exe中的函数. 0.00雪花

2008-2-17 12:39
14788

windows核心编程 第22章第八节
22.8 用CreateProcess插入代码
如果你的进程生成了你想插入代码的新进程,那么事情就会变得稍稍容易一些。原因之一是,你的进程(父进程)能够创建暂停运行的新进程。这就使你能够改变子进程的状态,而不影响它的运行,因为它尚未开始运行。但是父进程也能得到子进程的主线程的句柄。使用该句柄,可以修改线程执行的代码。你可以解决上一节提到的问题,因为可以设置线程的指令指针,以便执行内存映射文件中的代码。 下面介绍一种方法,它使你的进程能够控制子进程的主线程执行什么代码: 1) 使你的进程生成暂停运行的子进程。 2) 从. e x e模块的头文件中检索主线程的起始内存地址。 3) 将机器指令保存在该内存地址中。 4) 将某些硬编码的机器指令强制放入该地址中。这些指令应该调用L o a d L i b r a r y函数来加载D L L。 5) 继续运行子进程的主线程,使该代码得以执行。 6) 将原始指令重新放入起始地址。 7) 让进程继续从起始地址开始执行,就像没有发生任何事情一样。 上面的步骤6和7要正确运行是很困难的,因为你必须修改当前正在执行的代码。不过这是可能的。 这种方法具有许多优点。首先,它在应用程序执行之前就能得到地址空间。第二,它既能在Windows 98上使用,也能在Windows 2000上使用。第三,由于你不是调试者,因此能够很容易使用插入的D L L来调试应用程序。最后,这种方法可以同时用于控制台和G U I应用程序。 当然,这种方法也有某些不足。只有当你的代码是父进程时,才能插入D L L。另外,这种方法当然不能跨越不同的C P U来运行,必须对不同的C P U平台进行相应的修改。

//我参考他和另一篇网上文章,来注入dll,并且内联挂钩了某游戏的加减密函数,在windows xp平台下编译通过.当然还可以创建远现程进行远程通信,相当与可以间接的调用游戏里边的函数

//HookDll.h
#pragma once
#include <windows.h>
//硬编码结构体

#pragma pack (push ,1) // 保证下面的结构体采用BYTE对齐(必须)

typedef struct _INJECT_LOADLIBRARY_CODE

{

        BYTE int_PUSHAD; // pushad 0x60

        BYTE int_PUSH; // push &szDLL 0x68

        DWORD push_Value; // &szDLL = "HookDll.dll"的path

        BYTE int_MOVEAX; // move eax &LoadLibrary 0xB8

        DWORD eax_Value; // &LoadLibrary

        WORD call_eax; // call eax 0xD0FF(FF D0) (LoadLibrary("ApiSpy.dll");

        BYTE jmp_MOVEAX; // move eax &ReplaceOldCode 0xB8

        DWORD jmp_Value; // JMP的参数

        WORD jmp_eax; // jmp eax 0xE0FF(FF E0) jmp ReplaceOldCode;

        char szDLL[MAX_PATH]; // "ApiSpy.dll"的FullPath

}INJECT_LOADLIBRARY_CODE, *LPINJECT_CODE;

#pragma pack (pop , 1)

typedef struct _JMP_CODE
{
        DWORD lpEntryPoint;
        DWORD OldAddr;
        DWORD OldCode[4];
}JMP_CODE,* LPJMP_CODE;

// FileMaping的结构体

typedef struct _SPY_MEM_SHARE

{

        LPBYTE lpEntryPoint; // 目标进程的入口地址

        BYTE oldcode[sizeof(INJECT_LOADLIBRARY_CODE)]; // 目标进程的代码保存

}SPY_MEM_SHARE, * LPSPY_MEM_SHARE;

typedef  void   (__stdcall *FP)(unsigned char *,unsigned int);
BOOL WINAPI InitMyDll();

void __stdcall InitDecrypt();
void __stdcall HookDecrypt();
void __stdcall UnHookDecrypt();

void __stdcall InitEncrypt();
void __stdcall HookEncrypt();
void __stdcall UnHookEncrypt();
DWORD RecvThread(void* param) ;

// HookDll.cpp : 定义 DLL 应用程序的入口点。
//

#include "stdafx.h"
#include <stddef.h>
#include <stdio.h>
#include <winsock2.h>
#include <ws2tcpip.h>
#include "HookDll.h"

#pragma comment(lib,"Ws2_32.lib")

static JMP_CODE _lpCode;

// 转入处理程序

BYTE btOldDecryptBytes[9];
BYTE btOldEncryptBytes[9];

DWORD old_adress_decrypt = 0x0078DFB0;
DWORD old_adress_encrypt = 0x0078DF30;

DWORD ret_address_encrypt = 0;
DWORD inbuf_encrypt = 0;
DWORD longth_encrypt  = 0;

DWORD ret_address_decrypt = 0;
DWORD inbuf_decrypt = 0;
DWORD longth_decrypt  = 0;

#define DEFAULT_PORT "7110"
SOCKET ListenSocket = INVALID_SOCKET,ClientSocket = INVALID_SOCKET;

DWORD RecvThread(void* param)
{
        WSADATA wsaData;

        struct addrinfo *result = NULL,hints;
        unsigned char recvbuf[1024];
        int iResult;
        int recvbuflen = 1024;
       

        // Initialize Winsock
        iResult = WSAStartup(MAKEWORD(2,2), &wsaData);
        if (iResult != 0)
        {
                printf("WSAStartup failed: %d\n", iResult);
                return 1;
        }

        ZeroMemory(&hints, sizeof(hints));
        hints.ai_family = AF_INET;
        hints.ai_socktype = SOCK_STREAM;
        hints.ai_protocol = IPPROTO_TCP;
        hints.ai_flags = AI_PASSIVE;

        // Resolve the server address and port
        iResult = getaddrinfo(NULL, DEFAULT_PORT, &hints, &result);
        if ( iResult != 0 )
        {
                printf("getaddrinfo failed: %d\n", iResult);
                WSACleanup();
                return 1;
        }

        // Create a SOCKET for connecting to server
        ListenSocket = socket(result->ai_family, result->ai_socktype, result->ai_protocol);
        if (ListenSocket == INVALID_SOCKET)
        {
                printf("socket failed: %ld\n", WSAGetLastError());
                freeaddrinfo(result);
                WSACleanup();
                return 1;
        }

        // Setup the TCP listening socket
        iResult = bind( ListenSocket, result->ai_addr, (int)result->ai_addrlen);
        if (iResult == SOCKET_ERROR)
        {
                printf("bind failed: %d\n", WSAGetLastError());
                freeaddrinfo(result);
                closesocket(ListenSocket);
                WSACleanup();
                return 1;
        }

        freeaddrinfo(result);

        iResult = listen(ListenSocket, SOMAXCONN);
        if (iResult == SOCKET_ERROR)
        {
                printf("listen failed: %d\n", WSAGetLastError());
                closesocket(ListenSocket);
                WSACleanup();
                return 1;
        }

        // Accept a client socket
        while(1)
        {

                ClientSocket = accept(ListenSocket, NULL, NULL);
                if (ClientSocket == INVALID_SOCKET)
                {
                        printf("accept failed: %d\n", WSAGetLastError());
                        closesocket(ListenSocket);
                        ClientSocket = INVALID_SOCKET;
                        continue;
                }

                memset(recvbuf,0,sizeof(recvbuf));

                iResult = recv(ClientSocket, (char *)recvbuf, recvbuflen, 0);

                if(iResult != recvbuflen)
                {
                        printf("recv failed: %d\n", WSAGetLastError());
                        closesocket(ClientSocket);
                        ClientSocket = INVALID_SOCKET;
                        continue;
                }

                //这里可以调用exe函数

                //结果保存在recvbuf里,返回去

                send(ClientSocket,(char *)&recvbuf,recvbuflen,0);

                iResult = shutdown(ClientSocket, SD_SEND);
                if (iResult == SOCKET_ERROR)
                {
                        printf("shutdown failed: %d\n", WSAGetLastError());
                        closesocket(ClientSocket);
                        ClientSocket = INVALID_SOCKET;
                        continue;
                }
                closesocket(ClientSocket);
               
        }
        WSACleanup();
        return 0;
}

char* __stdcall PrintBin(const unsigned char* buf, int buf_size)
{
    static char tmp_buf[1024 * 4] = { 0 } ;
    memset(tmp_buf, 0, sizeof(tmp_buf)) ;
    char tmp_str[5] = { 0 } ;
    int i = 0 ;
    int j = 0 ;

    if (buf_size > 1024)
    {
        return tmp_buf ;
    }

    for (; i < buf_size; i += 16)
    {
        for (j = 0; j < 16; j++)
        {
            if (i + j >= buf_size)
            {
                break ;
            }
            wsprintf(tmp_str, "%02x ", buf[i + j]) ;
            strcat(tmp_buf, tmp_str) ;
        }
        strcat(tmp_buf, "\r\n");
    }

        strcat(tmp_buf,"\r\n");
        const char *filename = "f:\\01.txt";
        const char *recvline = "---------------------recv---------------------\r\n\r\n";
        HANDLE hFile = CreateFile(filename, GENERIC_WRITE, FILE_SHARE_WRITE, NULL,OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, 0);

        if ( hFile != INVALID_HANDLE_VALUE)
        {
                DWORD num;
                LONG lDistance = 0x00;
                SetFilePointer (hFile, lDistance, NULL, FILE_END) ;
                WriteFile(hFile,recvline,strlen(recvline),&num,NULL);
                SetFilePointer (hFile, lDistance, NULL, FILE_END) ;
                WriteFile(hFile,tmp_buf,strlen(tmp_buf),&num,NULL);
                CloseHandle(hFile);
        }
    return tmp_buf;
}

char* __stdcall PrintBin01(const unsigned char* buf, int buf_size)
{
    static char tmp_buf[1024 * 4] = { 0 } ;
    memset(tmp_buf, 0, sizeof(tmp_buf)) ;
    char tmp_str[5] = { 0 } ;
    int i = 0 ;
    int j = 0 ;

    if (buf_size > 1024)
    {
        return tmp_buf ;
    }

    for (; i < buf_size; i += 16)
    {
        for (j = 0; j < 16; j++)
        {
            if (i + j >= buf_size)
            {
                break ;
            }
            wsprintf(tmp_str, "%02x ", buf[i + j]) ;
            strcat(tmp_buf, tmp_str) ;
        }
        strcat(tmp_buf, "\r\n");
    }

        strcat(tmp_buf,"\r\n");
        const char *filename = "f:\\01.txt";
        const char *recvline = "---------------------send---------------------\r\n\r\n";
        HANDLE hFile = CreateFile(filename, GENERIC_WRITE, FILE_SHARE_WRITE, NULL,OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, 0);

        if ( hFile != INVALID_HANDLE_VALUE)
        {
                DWORD num;
                LONG lDistance = 0x00;
                SetFilePointer (hFile, lDistance, NULL, FILE_END) ;
                WriteFile(hFile,recvline,strlen(recvline),&num,NULL);
                SetFilePointer (hFile, lDistance, NULL, FILE_END) ;
                WriteFile(hFile,tmp_buf,strlen(tmp_buf),&num,NULL);
                CloseHandle(hFile);
        }
    return tmp_buf;
}

//这里注意堆栈平衡,与现场保护
void  __declspec(naked) DeCrypt()
{
        //因为前边
        //push eax //保护现场把eax压入
        //mov eax 0xxxxxxxxx
        //jmp eax
        //这里恢复eax
       
        _asm pop eax
        //又需要用到eax进行保存参数
        _asm push eax
        _asm mov eax,dword ptr [esp+0x4]
        _asm mov ret_address_decrypt, eax
        _asm mov eax,dword ptr[esp+0x8]
        _asm mov inbuf_decrypt,eax
        _asm mov eax,dword ptr[esp+0x0c]
        _asm mov longth_decrypt,eax
        _asm pop eax
        //保存现场
        _asm pushad
        //剪除挂钩
        _asm call UnHookDecrypt
        //恢复挂钩之前的现场
        _asm popad
        //把返回地址弹出去
        _asm add esp,4
        //调用原始函数
        _asm call old_adress_decrypt
        //恢复挂钩
        _asm call HookDecrypt
        //dump出参数
        _asm push longth_decrypt
        _asm push inbuf_decrypt
        _asm call PrintBin
        //跳回挂钩函数的下条指令
        _asm jmp ret_address_decrypt

}

void  __declspec(naked) EnCrypt()
{
        _asm pop eax
        _asm push eax
        _asm mov eax,dword ptr [esp+0x4]
        _asm mov ret_address_encrypt, eax
        _asm mov eax,dword ptr[esp+0x8]
        _asm mov inbuf_encrypt,eax
        _asm mov eax,dword ptr[esp+0x0c]
        _asm mov longth_encrypt,eax
        _asm pop eax
        _asm pushad
        _asm push longth_encrypt
        _asm push inbuf_encrypt
        _asm call PrintBin01
        _asm call UnHookEncrypt
        _asm popad
        _asm add esp,4
        _asm call old_adress_encrypt
        _asm call HookEncrypt
        _asm jmp ret_address_encrypt

}

void __stdcall InitDecrypt()
{
        HANDLE hGame = GetCurrentProcess();

        DWORD dwCodeSize = 0;

        ReadProcessMemory(hGame, (void *)old_adress_decrypt, (void *)btOldDecryptBytes, sizeof(btOldDecryptBytes), &dwCodeSize);

       

        //push eax
        //mov eax 0xxxxxxxxx
        //jmp eax
        BYTE btNewBytes[9] = {0x50,0xB8,0x00,0x00,0x40,0x00,0x0FF,0x0E0,0x00 };

        *(DWORD *)( btNewBytes + 2) = (DWORD)DeCrypt;

        dwCodeSize = 0;

        DWORD fNew, fOld;

        fNew = PAGE_READWRITE;

        VirtualProtect((void*)old_adress_decrypt, sizeof(btOldDecryptBytes), fNew, &fOld);

        WriteProcessMemory(hGame, (void *)old_adress_decrypt, (void *)btNewBytes, sizeof(btOldDecryptBytes), &dwCodeSize);

        VirtualProtect((void*)old_adress_decrypt, sizeof(btOldDecryptBytes), fOld, &fNew);

}
void __stdcall InitEncrypt()
{
        HANDLE hGame = GetCurrentProcess();

        DWORD dwCodeSize = 0;

        ReadProcessMemory(hGame, (void *)old_adress_encrypt, (void *)btOldEncryptBytes, sizeof(btOldEncryptBytes), &dwCodeSize);

       

        BYTE btNewBytes[9] = {0x50,0xB8,0x00,0x00,0x40,0x00,0x0FF,0x0E0,0x00 };

        *(DWORD *)( btNewBytes + 2) = (DWORD)EnCrypt;

        dwCodeSize = 0;

        DWORD fNew, fOld;

        fNew = PAGE_READWRITE;

        VirtualProtect((void*)old_adress_encrypt, sizeof(btOldEncryptBytes), fNew, &fOld);

        WriteProcessMemory(hGame, (void *)old_adress_encrypt, (void *)btNewBytes, sizeof(btOldEncryptBytes), &dwCodeSize);

        VirtualProtect((void*)old_adress_encrypt, sizeof(btOldEncryptBytes), fOld, &fNew);

}

void __stdcall HookDecrypt()
{

       

        DWORD dwCodeSize = 0;

        BYTE btNewBytes[9] = {0x50,0xB8,0x00,0x00,0x40,0x00,0x0FF,0x0E0,0x00 };

        *(DWORD *)( btNewBytes + 2) = (DWORD)DeCrypt;
        DWORD fNew, fOld;

        fNew = PAGE_READWRITE;

        HANDLE hGame = GetCurrentProcess();

        VirtualProtect((void*)old_adress_decrypt, sizeof(btOldDecryptBytes), fNew, &fOld);

        WriteProcessMemory(hGame, (void *)old_adress_decrypt, (void *)btNewBytes, sizeof(btOldDecryptBytes), &dwCodeSize);

        VirtualProtect((void*)old_adress_decrypt, sizeof(btOldDecryptBytes), fOld, &fNew);

}
void __stdcall HookEncrypt()
{

       

        DWORD dwCodeSize = 0;

        BYTE btNewBytes[9] = {0x50,0xB8,0x00,0x00,0x40,0x00,0x0FF,0x0E0,0x00 };

        *(DWORD *)( btNewBytes + 2) = (DWORD)EnCrypt;
        DWORD fNew, fOld;

        fNew = PAGE_READWRITE;

        HANDLE hGame = GetCurrentProcess();

        VirtualProtect((void*)old_adress_encrypt, sizeof(btOldEncryptBytes), fNew, &fOld);

        WriteProcessMemory(hGame, (void *)old_adress_encrypt, (void *)btNewBytes, sizeof(btOldEncryptBytes), &dwCodeSize);

        VirtualProtect((void*)old_adress_encrypt, sizeof(btOldEncryptBytes), fOld, &fNew);

}
void _stdcall UnHookDecrypt()
{
       

        DWORD dwCodeSize = 0;

        DWORD fNew, fOld;

        fNew = PAGE_READWRITE;

        HANDLE hGame = GetCurrentProcess();

        VirtualProtect((void*)old_adress_decrypt, sizeof(btOldDecryptBytes), fNew, &fOld);

        WriteProcessMemory(hGame, (void *)old_adress_decrypt, (void *)btOldDecryptBytes, sizeof(btOldDecryptBytes), &dwCodeSize);

        VirtualProtect((void*)old_adress_decrypt, sizeof(btOldDecryptBytes), fOld, &fNew);

}
void _stdcall UnHookEncrypt()
{
       

        DWORD dwCodeSize = 0;

        DWORD fNew, fOld;

        fNew = PAGE_READWRITE;

        HANDLE hGame = GetCurrentProcess();

        VirtualProtect((void*)old_adress_encrypt, sizeof(btOldEncryptBytes), fNew, &fOld);

        WriteProcessMemory(hGame, (void *)old_adress_encrypt, (void *)btOldEncryptBytes, sizeof(btOldEncryptBytes), &dwCodeSize);

        VirtualProtect((void*)old_adress_encrypt, sizeof(btOldEncryptBytes), fOld, &fNew);

}

DWORD* _glpMovEax;

DWORD _gfNew, _gfOld;

void __declspec(naked) DoJmpEntryPoint ()

{

        // 恢复call LoadLibrary后面的代码

        _gfNew = PAGE_READWRITE;

        _glpMovEax = (DWORD*)_lpCode.OldAddr;

        VirtualProtect(_glpMovEax, 2*sizeof(DWORD), _gfNew, &_gfOld);

        *_glpMovEax = _lpCode.OldCode[0];

        *(_glpMovEax + 1) = _lpCode.OldCode[1];

        VirtualProtect(_glpMovEax, 2*sizeof(DWORD), _gfOld, &_gfNew);

        //第八步:目标进程Jmp至原来的入口,继续运行程序。

        // 跳至目标代码的入口

        _asm popad

        _asm jmp _lpCode.lpEntryPoint

}
BOOL WINAPI InitMyDll()
{

        HANDLE hMap;

        LPSPY_MEM_SHARE lpMem;

        DWORD dwSize;

        BOOL rc;

        BYTE* _lpBytes;

        // 取得FileMapping的句柄
       

        hMap = OpenFileMapping(FILE_MAP_ALL_ACCESS, 0, "MyDllMapView");

        if(hMap)

        {
               

                lpMem = (LPSPY_MEM_SHARE)MapViewOfFile(hMap,FILE_MAP_ALL_ACCESS,0, 0, 0);

                if(lpMem)

                {

                        //第七步:目标进程运行完LoadLibrary(MyDll)后,将原来的代码写回目标进程的入口。
                        // 恢复目标进程的入口代码
                        // 得到INJECT_LOADLIBRARY_CODE结构成员BYTE jmp_MOVEAX地址;

                        _lpCode.OldAddr = (DWORD)((BYTE*)lpMem->lpEntryPoint + offsetof(INJECT_LOADLIBRARY_CODE, jmp_MOVEAX));

                        _lpCode.lpEntryPoint = (DWORD)lpMem->lpEntryPoint;

                        // 保存INJECT_LOADLIBRARY_CODE结构成员BYTE jmp_MOVEAX地址后四个字节,注意这里是原始子进程未修改前的数据

                        memcpy(&_lpCode.OldCode, (BYTE*)lpMem->oldcode + offsetof(INJECT_LOADLIBRARY_CODE, jmp_MOVEAX), 2*sizeof(DWORD));

                        // 恢复目标进程的入口代码
                        DWORD fNew, fOld;

                        fNew = PAGE_READWRITE;

                        VirtualProtect(lpMem->lpEntryPoint, sizeof(INJECT_LOADLIBRARY_CODE), fNew, &fOld);

                        rc = WriteProcessMemory(GetCurrentProcess(), lpMem->lpEntryPoint, lpMem->oldcode, sizeof(INJECT_LOADLIBRARY_CODE), &dwSize);

                        VirtualProtect(lpMem->lpEntryPoint, sizeof(INJECT_LOADLIBRARY_CODE), fOld, &fNew);
                       
                        _lpBytes = (BYTE*)lpMem->lpEntryPoint + offsetof(INJECT_LOADLIBRARY_CODE, jmp_MOVEAX);

                        UnmapViewOfFile(lpMem);

                }

                CloseHandle(hMap);

        }
        //
        //这里可以干一些好事或者坏事

        //...........................

        InitDecrypt();
        InitEncrypt();

        //创建远线程
        //DWORD dwThreadId;
        //hRecvThread = CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE)RecvThread,
        //                               (void*)RecvThread, 0, &dwThreadId);

        //后边恢复原始的代码
        // 将LoadLibrary后面的代码写为转入处理程序中

        // 指令为:mov eax, objAddress

        // jmp eax

        BYTE* lpMovEax;

        DWORD* lpMovEaxValue;

        WORD* lpJmp;

        DWORD fNew, fOld;

        fNew = PAGE_READWRITE;

        lpMovEax = _lpBytes;

        VirtualProtect(lpMovEax, 2*sizeof(DWORD), fNew, &fOld);

        //move eax &DoJmpEntryPoint

        *lpMovEax = 0xB8;

        lpMovEaxValue = (DWORD*)(lpMovEax + 1);

        *lpMovEaxValue = (DWORD)&DoJmpEntryPoint;

        //jmp eax
        lpJmp = (WORD*)(lpMovEax + 5);

        *lpJmp = 0xE0FF; // (FF E0)

        VirtualProtect(lpMovEax, 2*sizeof(DWORD), fOld, &fNew);

        return TRUE;

}

BOOL WINAPI DllMain( HANDLE hModule, DWORD ul_reason_for_call, LPVOID lpReserved )
{
        switch( ul_reason_for_call )
        {
        case DLL_PROCESS_ATTACH:
                {
                       
                        return InitMyDll();
                }

                break;

        case DLL_THREAD_ATTACH:
                break;

        case DLL_THREAD_DETACH:
                break;

        case DLL_PROCESS_DETACH:
                break;
        }
        return TRUE;
}

// myhook.cpp : 定义控制台应用程序的入口点。
//

#include "stdafx.h"
#include <windows.h>
#include <imagehlp.h>

#pragma comment(lib,"Imagehlp.lib")
//硬编码结构体

#pragma pack (push ,1) // 保证下面的结构体采用BYTE对齐(必须)

typedef struct _INJECT_LOADLIBRARY_CODE
{

        BYTE int_PUSHAD; // pushad 0x60

        BYTE int_PUSH; // push &szDLL 0x68

        DWORD push_Value; // &szDLL = "HookDll.dll"的path

        BYTE int_MOVEAX; // move eax &LoadLibrary 0xB8

        DWORD eax_Value; // &LoadLibrary

        WORD call_eax; // call eax 0xD0FF(FF D0) (LoadLibrary("HookDll.dll");

        BYTE jmp_MOVEAX; // move eax &ReplaceOldCode 0xB8

        DWORD jmp_Value; // JMP的参数

        WORD jmp_eax; // jmp eax 0xE0FF(FF E0) jmp ReplaceOldCode;

        char szDLL[MAX_PATH]; // "ApiSpy.dll"的FullPath

}INJECT_LOADLIBRARY_CODE, *LPINJECT_CODE;

#pragma pack (pop , 1)

// FileMaping的结构体

typedef struct
{

        LPBYTE  lpEntryPoint;   // 目标进程的入口地址

        BYTE    oldcode[sizeof(INJECT_LOADLIBRARY_CODE)];        // 目标进程的代码保存

}SPY_MEM_SHARE, * LPSPY_MEM_SHARE;

LPBYTE  GetExeEntryPoint(char *filename)

{

        PIMAGE_NT_HEADERS      pNTHeader;

        DWORD pEntryPoint;

        PLOADED_IMAGE       pImage;

        pImage = ImageLoad(filename, NULL);

        if(pImage == NULL)

                return NULL;

        pNTHeader = pImage->FileHeader;

        pEntryPoint = pNTHeader->OptionalHeader.AddressOfEntryPoint + pNTHeader->OptionalHeader.ImageBase;

        ImageUnload(pImage);

        return (LPBYTE)pEntryPoint;

}

int _tmain(int argc, _TCHAR* argv[])
{

        ////////////Create Process//////////////
        char LoadExe[MAX_PATH];
        ZeroMemory(LoadExe,MAX_PATH);

        char lpCommandLine[MAX_PATH];
        ZeroMemory(lpCommandLine,MAX_PATH);
        //注入dll的exe文件名
        strcat(LoadExe,"test.exe");
        //strcpy(lpCommandLine,LoadExe);

        //exe传入的命令行参数
        strcat(lpCommandLine," xxxxx");

       

        printf("%s\n",LoadExe);

        STARTUPINFO si;
        PROCESS_INFORMATION pi;

        ZeroMemory( &si, sizeof(si) );
        si.cb = sizeof(si);
        ZeroMemory( &pi, sizeof(pi) );

        // Start the child process.
        if( !CreateProcess( LoadExe, // No module name (use command line).
                lpCommandLine, // Command line.
                NULL,             // Process handle not inheritable.
                NULL,             // Thread handle not inheritable.
                FALSE,            // Set handle inheritance to FALSE.
                CREATE_SUSPENDED,                // No creation flags.
                NULL,             // Use parent's environment block.
                NULL,             // Use parent's starting directory.
                &si,              // Pointer to STARTUPINFO structure.
                &pi )             // Pointer to PROCESS_INFORMATION structure.
                )
        {
                printf( "CreateProcess failed.\n" );
                DWORD dwError = GetLastError();
                printf("Error %d \n",dwError);
                getchar();
                return 0;
        }

        PBYTE pEntryPoint = GetExeEntryPoint(LoadExe);

        //创建FileMapping

        HANDLE hMap = CreateFileMapping((HANDLE)0xFFFFFFFF, NULL,PAGE_READWRITE, 0, sizeof(SPY_MEM_SHARE), "MyDllMapView");

        LPSPY_MEM_SHARE  lpMap = (LPSPY_MEM_SHARE)MapViewOfFile(hMap, FILE_MAP_ALL_ACCESS, 0, 0, 0);

        DWORD cBytesMoved;

        ReadProcessMemory(pi.hProcess, pEntryPoint,

                &lpMap->oldcode, sizeof(INJECT_LOADLIBRARY_CODE),

                &cBytesMoved);

        lpMap->lpEntryPoint = pEntryPoint;

        // 第四步:在目标进程的入口写入LoadLibrary(MyDll)实现Dll的注入。

        // 准备注入DLL的代码

        INJECT_LOADLIBRARY_CODE     newCode;

        ZeroMemory(&newCode,sizeof(INJECT_LOADLIBRARY_CODE));

        // 写入MyDll―――用全路径

        char szMyDll[MAX_PATH];
        memset(szMyDll,0,sizeof(szMyDll));
        strcat(szMyDll,"HookDll.dll");

        lstrcpy(newCode.szDLL, szMyDll);

        // 准备硬代码(汇编代码)

        newCode.int_PUSHAD = 0x60;   // pushad 0x60

        newCode.int_PUSH = 0x68;     //push &szDLL 0x68

        newCode.int_MOVEAX = 0xB8;   //move eax &LoadLibrary 0xB8

        newCode.call_eax = 0xD0FF;   // call eax 0xD0FF(FF D0) (LoadLibrary("ApiSpy.dll");

        newCode.jmp_MOVEAX = 0xB8;   // move eax &ReplaceOldCode 0xB8

        newCode.jmp_eax = 0xE0FF;    // jmp eax 0xE0FF(FF E0) jmp ReplaceOldCode;

        newCode.eax_Value = (DWORD)&LoadLibrary; // &LoadLibrary

        newCode.push_Value= (DWORD)(pEntryPoint + offsetof(INJECT_LOADLIBRARY_CODE,szDLL)); //&szDLL = "HookDll.dll"的path

        /*
        上面结构体的代码为汇编代码,对应的汇编为:

        pushad

        push szDll

        mov eax, &LoadLibraryA

        call eax  // 实现调用LoadLibrary(szDll)的代码

        mov eax, oldentry

        jmp eax // 实现在LoadLibrary运行完后, 跳至目标进程的入口继续运行
        */

        // 将硬代码写入目标进程的入口

        // 修改内存属性

        DWORD dwNewFlg, dwOldFlg;

        dwNewFlg = PAGE_READWRITE;

        VirtualProtectEx(pi.hProcess, (LPVOID)pEntryPoint, sizeof(DWORD), dwNewFlg, &dwOldFlg);

        DWORD dwWrited;
        WriteProcessMemory(pi.hProcess, pEntryPoint,&newCode, sizeof(newCode), &dwWrited);
        VirtualProtectEx(pi.hProcess, (LPVOID)pEntryPoint, sizeof(DWORD), dwOldFlg, &dwNewFlg);

        // 释放FileMaping  注意,不是Closehandle(hMap)

        UnmapViewOfFile(lpMap);

        // 继续目标进程的运行

        //第五步:用ResumeThread运行目标进程。

        ResumeThread(pi.hThread);

        //一定要加个sleep,不加的话CreateFileMapping文件就会delete掉,dll就不能找到这个映射文件了。

                               

        Sleep(20000);

        return 0;
}


[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!

收藏
免费 7
支持
分享
最新回复 (3)
雪    币: 217
活跃值: (10)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
2
.....................
2008-2-17 12:41
0
雪    币: 217
活跃值: (10)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
3
我的内存映文件应该有问题.我问也没人知道.但是注入dll绝对可以的.
2008-2-17 12:43
0
雪    币: 217
活跃值: (10)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
4
hs验证怎么过呢
2008-2-17 13:02
0
游客
登录 | 注册 方可回帖
返回
//