zoukankan      html  css  js  c++  java
  • EAT/IAT Hook

    标 题: EAT/IAT Hook

    作 者: Y4ng

    时 间: 2013-08-21

    链 接: http://www.cnblogs.com/Y4ng/p/EAT_IAT_HOOK.html 

    #include <windows.h>
    #include <shlwapi.h>
    #include <wchar.h>
    DWORD MyZwGetContextThread(HANDLE Thread,LPCONTEXT lpContext)
    {
      memset(lpContext,0,sizeof(CONTEXT));
      return 0;
    }
    DWORD MyZwSetContextThread(HANDLE Thread,LPCONTEXT lpContext)
    {
      memset(lpContext,0,sizeof(CONTEXT));
      return 0;
    }
    /**********************************************************
    IAT Hook :挂钩目标输入表中的函数地址
    参数:
    char *szDLLName 函数所在的DLL
    char *szName    函数名字
    void *Addr      新函数地址
    ***********************************************************/
    DWORD IATHook(char *szDLLName,char *szName,void *Addr)
    {
      DWORD Protect;
      HMODULE hMod=LoadLibrary(szDLLName);
      DWORD RealAddr=(DWORD)GetProcAddress(hMod,szName);
      hMod=GetModuleHandle(NULL);
        IMAGE_DOS_HEADER * DosHeader   =(PIMAGE_DOS_HEADER)hMod;
        IMAGE_OPTIONAL_HEADER * Opthdr =(PIMAGE_OPTIONAL_HEADER)((DWORD)hMod+DosHeader->e_lfanew+24);
        IMAGE_IMPORT_DESCRIPTOR *pImport =(IMAGE_IMPORT_DESCRIPTOR*)((BYTE*)DosHeader+Opthdr->DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT].VirtualAddress);                                           
        if(pImport==NULL)
        {
            return FALSE;
        } 
        IMAGE_THUNK_DATA32 *Pthunk=(IMAGE_THUNK_DATA32*)((DWORD)hMod+pImport->FirstThunk);
      while(Pthunk->u1.Function)
      {
        if(RealAddr==Pthunk->u1.Function)
        {
          VirtualProtect(&Pthunk->u1.Function,0x1000,PAGE_READWRITE,&Protect);
          Pthunk->u1.Function=(DWORD)Addr;
          break;
        }
        Pthunk++;
      }
      return TRUE;
    }
    /**********************************************************
    EAT Hook :挂钩目标输出表中的函数地址
    ***********************************************************/
    BOOL EATHook(char *szDLLName,char *szFunName,DWORD NewFun)
    {
      DWORD addr=0;
      DWORD index=0;
      HMODULE hMod=LoadLibrary(szDLLName);
        DWORD Protect;
        IMAGE_DOS_HEADER * DosHeader   =(PIMAGE_DOS_HEADER)hMod;
        IMAGE_OPTIONAL_HEADER * Opthdr =(PIMAGE_OPTIONAL_HEADER)((DWORD)hMod+DosHeader->e_lfanew+24);
        PIMAGE_EXPORT_DIRECTORY Export =(PIMAGE_EXPORT_DIRECTORY)((BYTE*)DosHeader+ Opthdr->DataDirectory[IMAGE_DIRECTORY_ENTRY_EXPORT].VirtualAddress);
        PULONG pAddressOfFunctions     =(ULONG*)((BYTE*)hMod+Export->AddressOfFunctions); 
        PULONG pAddressOfNames         =(ULONG*)((BYTE*)hMod+Export->AddressOfNames); 
        PUSHORT  pAddressOfNameOrdinals=(USHORT*)((BYTE*)hMod+Export->AddressOfNameOrdinals); 
        for (int i=0;i <Export->NumberOfNames; i++) 
        {
            index=pAddressOfNameOrdinals[i];
            char *pFuncName = (char*)( (BYTE*)hMod + pAddressOfNames[i]);
            if (_stricmp( (char*)pFuncName,szFunName) == 0)
            {
                addr=pAddressOfFunctions[index];
                break;
            }
        }
      VirtualProtect(&pAddressOfFunctions[index],0x1000,PAGE_READWRITE,&Protect);
        pAddressOfFunctions[index] =(DWORD)NewFun - (DWORD)hMod;
      return TRUE;
    }
    BOOL WINAPI DllMain(HMODULE hModule, DWORD dwReason, PVOID pvReserved)
    {
      if (dwReason == DLL_PROCESS_ATTACH)
      {
        DisableThreadLibraryCalls(hModule);
        IATHook("kernel32.dll","ExitProcess",MyZwGetContextThread);
        //GetProcAddress(LoadLibrary("ntdll.dll"),"NtSetInformationFile");         /** Test EAT HOOK **/
        //ExitThread(0);                                                           /** Test IAT HOOK**/
      }
      return TRUE;
    } 

    转自邓韬

  • 相关阅读:
    centos 搭建git 服务器
    easyui Tree树形控件的异步加载
    iis7 部署 mvc4项目提示404错误
    CS0012: 类型“System.Data.Objects.DataClasses.EntityObject”在未被引用的程序集中定义
    asp.net mvc 自定义身份验证
    asp.net mvc 自定义身份验证 2
    爬取五八同城上房子信息并保存到Excel
    scrapy爬取图片并自定义图片名字
    Scrapy爬取到的中文数据乱码问题处理
    scrapy图片-爬取哈利波特壁纸
  • 原文地址:https://www.cnblogs.com/Y4ng/p/EAT_IAT_HOOK.html
Copyright © 2011-2022 走看看