-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdllmain.cpp
98 lines (83 loc) · 2.55 KB
/
dllmain.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
// dllmain.cpp : DLL 애플리케이션의 진입점을 정의합니다.
#pragma once
#include <windows.h>
#include <stdio.h>
#include <GL/glut.h>
#include "draw.h"
namespace hooker {
DWORD origin_addr = 0;
int a = 10;
int b = 10;
int c = 1;
void hookf() {
Draw* dtpr = new Draw;
if (a == 100)
c *= -1;
else if (a == 9)
c *= -1;
dtpr->box(a, b, 200, 200, 255, 000, 255);
a += c;
b += c;
glFlush();
}
void modifier(DWORD origin,DWORD newfunc,int size) {
DWORD Protect = 0;
DWORD newOffset = newfunc - origin +1 ; //make offset
VirtualProtect((LPVOID)origin, size, PAGE_EXECUTE_READWRITE, &Protect); //change page permission
printf("origin addr : %08x \n", origin);
printf("tramp addr : %08x \n", newfunc);
origin_addr = origin + size;
*((LPBYTE)origin + 0) = 0xE9; //overwrite - JMP
origin += 1;
*((LPDWORD)origin + 0) = newOffset; //ADDR 4byte
origin += 4;
*((LPBYTE)origin) = 0x90; //NOP
}
void Tramp() {
__asm {
PUSHFD //save all register and flags
PUSHAD
CALL hookf //call custom function
POPAD
POPFD
PUSH EBP //origin function's asm
MOV EBP,ESP
SUB ESP,8
JMP [origin_addr] //back to origin
}
}
void hook() {
FILE* pFile = nullptr;
int* taddr = (int*)0x6814f4e0;
int** faddr =(int **) *taddr ;
int offset = 0x88 / sizeof(int);
if (AllocConsole()) {
freopen_s(&pFile, "CONIN$", "rb", stdin);
freopen_s(&pFile, "CONOUT$", "wb", stdout);
freopen_s(&pFile, "CONOUT$", "wb", stderr);
printf("base : %08x \n", taddr);
printf("follow address : %08x \n", *taddr);
printf("follow pointer: %08x \n", faddr+offset);
printf("function pointer : %08x \n", *(faddr + offset));
modifier((DWORD)*(faddr + offset),(DWORD)Tramp, 6);
}
}
};
BOOL APIENTRY DllMain( HMODULE hModule,
DWORD ul_reason_for_call,
LPVOID lpReserved
)
{
switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH: {
MessageBox(nullptr, L"injection success", L"dll injection", MB_OK);
hooker::hook();
}
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}