网络编程 | 站长之家 | 网页制作 | 图形图象 | 操作系统 | 冲浪宝典 | 软件教学 | 网络办公 | 邮件系统 | 网络安全 | 认证考试 | 系统进程
Firefox | IE | Maxthon | 迅雷 | 电驴 | BitComet | FlashGet | QQ | QQ空间 | Vista | 输入法 | Ghost | Word | Excel | wps | Powerpoint
asp | .net | php | jsp | Sql | c# | Ajax | xml | Dreamweaver | FrontPages | Javascript | css | photoshop | fireworks | Flash | Cad | Discuz!
当前位置 > 网站建设学院 > 网络编程 > C/C++
Tag:注入,存储过程,分页,安全,优化,xmlhttp,fso,jmail,application,session,防盗链,stream,无组件,组件,md5,乱码,缓存,加密,验证码,算法,cookies,ubb,正则表达式,水印,索引,日志,压缩,base64,url重写,上传,控件,Web.config,JDBC,函数,内存,PDF,迁移,结构,破解,编译,配置,进程,分词,IIS,Apache,Tomcat,phpmyadmin,Gzip,触发器,socket
网络编程:ASP教程,ASP.NET教程,PHP教程,JSP教程,C#教程,数据库,XML教程,Ajax,Java,Perl,Shell,VB教程,Delphi,C/C++教程,软件工程,J2EE/J2ME,移动开发
本月文章推荐
.旋转的立体椭球(效果非常好).
.C++高质量编程点滴.
.Bjarne:如何对付内存泄漏?.
.C++箴言:绝不在构造或析构期调用.
.C语言教程第二章: 数据类型.
.Winsock技术在远程监控中的应用.
.C语言入门之运算符和表达式(2).
.穷举密码算法.
.C语言程序设计基础讲座之函数.
.关于怎么学习API.
.为VC++应用程序对话框添加透明位.
.如何获取屏幕保护程序的密码.
.通过键盘操作的,想进行c图形化编.
.美丽的彩色时钟.
.C语言嵌入式系统编程修炼之屏幕操.
.如何简化临时内存的分配与释放.
.在libxxx.a文件中如何查找函数.
.在代码隐藏中遍历当前页的所有控.
.C程序设计例解(08).
.容易理解魔方阵源程序.

Windows下的函数hook技术

发表日期:2008-3-8



  都是很成熟的东西了,这几天看了看,总结一下而已。
讨论了Windows下hook函数的几种方法。提供了一个hook TextOutA的完整例子。通过CreateRemoteThread的方法把hook dll注入到一个普通的应用程序中。Hooking Imported Functions by name调用 imported functions'时的步骤/实现
在程序中调用从其它模块引入的函数的方法和普通的函数调用有所不同。对于普通的函数调用,直接使用
call address来调用即可,但是对于
imported functions
,在编译的时候
compiler/link
并不知道实际的函数实现会被加载到那个地址,函数实现在那个地址在运行的时候才会确定。对于
imported functions
,首先是
call
引入表中的一个函数,在运行时再初始化引入表,使用
jmp
跳转到真实的函数实现。

引入表:
The PE file IMAGE_IMPORT_DESCRIPTOR strUCture, which holds all the information about functions imported from a specific DLL, has pointers to two arrays in the executable. These arrays are called import address tables (IATs), or sometimes thunk data arrays. The first pointer references the real IAT, which the program loader fixes up when the executable is loaded. The second pointer references the original IAT, which is untouched by the loader and lists the imported functions.

实现原理
  • 找到
    PE
    文件的
    Image_Import_Descriptor
    结构
  • 找到
    Original LAT

    Real LAT.
  • 通过要
    hook
    的函数的名字在
    Original LAT
    找到要
    hook

    imported function
    在数组中的
    index.
  • 保存并修改
    Real LAT
    在相应
    index

    function address
(refer to John Robbins, BugsLayerUtil.dll)

Hooking Imported Functions by ordinal

原理和
Hook Imported functions by name
一样,只是是通过要
hook
的函数的
ordinal

original LAT
中找到
index.

Hooking a function in this dll

当一个
DLL
是通过
LoadLibrary
载入的时候,我们无法通过
hook imported function
的方法的
hook
它中的
function
。有两种可能的办法处理这种情况:
第一种方法,遍历进程空间,发现
call
指定函数的地方替换为
call hookFunction.
太麻烦,而且不安全。


第二种方法,改写要
hook
的函数
FuncA
。比较好的方法
  1. 实现
    HookFuncA
    ,最后的实现垫入
    n

    nop.
  2. 找到要
    hook
    的函数
    FuncA
    的绝对地址,改写前
    5
    个字节为
    jmp hookFuncA(
    假定前
    5
    个字节为
    n
    个完整的指令
    )

  3. FuncA
    的前
    5
    个字节拷贝到
    hookFuncA
    的后面,在加上一条指令 jmp funcA+5.
    ----Code of HookDLL.dll, 可以通过CreateRemoteThread的方法把hook dll注入到一个普通的应用程序中。
    // HookDLL.cpp : Defines the entry point for the DLL application.
    //
    #include "stdafx.h"
    #include "HookDLL.h"
    #include "Log.h"
    //forward declare.
    LRESULT WINAPI InstallTextoutHook();
    LRESULT WINAPI UninstallTextoutHook();
    BOOL APIENTRY DllMain( HANDLE hModule,
    DWord ul_reason_for_call,
    LPVOID lpReserved
    )
    {
    switch (ul_reason_for_call)
    {
    case DLL_PROCESS_ATTACH:
    if (InstallTextoutHook())
    {
    WriteLog("Install hook success.\n");
    }else
    {
    WriteLog("Intall hook failed.\n");
    }
    break;
    case DLL_THREAD_ATTACH:
    break;
    case DLL_THREAD_DETACH:
    break;
    case DLL_PROCESS_DETACH:
    if (UninstallTextoutHook())
    {
    WriteLog("Uninstall hook success.\n");
    }else
    {
    WriteLog("Unintall hook failed.\n");
    }
    break;
    }
    return TRUE;
    }
    #define DWORD_PTR DWORD*
    #define __LOCAL_SIZE 40h
    #define NAKED_PROLOG() \
    DWORD_PTR dwRet ; \
    DWORD_PTR dwESI ; \
    { \
    __asm PUSH EBP /* Set up the standard frame.*/\
    __asm MOV EBP , ESP \
    __asm SUB ESP , __LOCAL_SIZE /* Save room for the local */\
    /* variables. */\
    __asm MOV EAX , EBP /* EBP has the stack coming */\
    /* into the fn. in it. */\
    __asm ADD EAX , 4 /* Account for PUSH EBP */\
    __asm MOV EAX , [EAX] /* Get return address. */\
    __asm MOV [dwRet] , EAX /* Save return address. */\
    __asm MOV [dwESI] , ESI /* Save ESI so chkesp in dbg */\
    /* builds works. */\
    }// The common epilog part that can be shared between the stdcall and
    // cdecl hook functions.
    #define EPILOG_COMMON() \
    { \
    __asm MOV ESI , [dwESI] /* Restore ESI. */\

    __asm ADD ESP , __LOCAL_SIZE /* Take away local var space */\
    __asm MOV ESP, EBP /* Restore standard frame. */\
    __asm POP EBP \
    }
    #define COPY_CODE_LENGTH 5
    BYTE g_abOriCode[COPY_CODE_LENGTH];
    BYTE g_abJmpCode[COPY_CODE_LENGTH];
    PROC g_oriTextout;
    BOOL g_blHooked = FALSE;
    LRESULT WINAPI InstallTextoutHook()
    {
    if (g_blHooked)
    return TRUE;
    //Get TextOutA's address.
    HMODULE hGdi32 = ::LoadLibrary(_T("Gdi32.dll"));
    g_oriTextout = GetProcAddress(hGdi32, _T("TextOutA"));
    if (NULL == g_oriTextout)
    return FALSE;
    //Get the hook'a address.
    HMODULE hModule = GetModuleHandle(_T("HookDLL.dll"));
    if (NULL == hModule)
    return FALSE;
    DWORD dwHookAddr = NULL;
    __asm
    {
    mov esi, offset HookLabel;
    mov edi, 0x10000000;//0x10000000 is the dll's base address.
    sub esi, edi;
    add esi, hModule;
    mov [dwHookAddr], esi;
    }
    //Get the NOP's address.
    DWORD dwNOPAddr = NULL;
    __asm
    {
    mov esi, offset NOPLabel;
    mov edi, 0x10000000;//0x10000000 is the dll's base address.
    sub esi, edi;
    add esi, hModule;
    mov [dwNOPAddr], esi;
    }
    //Save the first 5 byte of TextOutA to g_abOriCode
    __asm
    {
    mov esi, g_oriTextout;
    lea edi, g_abOriCode;
    cld;
    movsd;
    movsb;
    }
    //Generate the jmp Hook function.
    g_abJmpCode[0] = 0xe9;
    __asm
    {
    mov eax, dwHookAddr;
    mov ebx, g_oriTextout;
    add ebx, 5;
    sub eax, ebx;
    mov dword ptr[g_abJmpCode+1], eax;
    }
    //Write the jump instruction to the textoutA.
    DWORD dwProcessId = GetCurrentProcessId();
    HANDLE hProcess = OpenProcess (PROCESS_ALL_Access,
    FALSE, dwProcessId);
    if (NULL == hProcess)
    return FALSE;
    DWORD dwOldFlag;
    VirtualProtectEx(hProcess, g_oriTextout, 5, PAGE_READWRITE, &dwOldFlag);
    WriteProcessMemory(hProcess, g_oriTextout, g_abJmpCode, sizeof(g_abJmpCode), NULL);
    VirtualProtectEx(hProcess, g_oriTextout, 5, dwOldFlag, NULL);
    //Write g_abOriTextout to the end of Hook function(NOP addr), then write the jmp instruction.
    VirtualProtectEx(hProcess, (LPVOID)dwNOPAddr, 10, PAGE_READWRITE, &dwOldFlag);
    WriteProcessMemory(hProcess, (LPVOID)dwNOPAddr, g_abOriCode, sizeof(g_abOriCode), NULL);
    //Generate the jmp TextoutA + 5
    __asm
    {
    mov eax, g_oriTextout;
    mov ebx, dwNOPAddr;
    add ebx, 5;
    sub eax, ebx;
    mov dword ptr[g_abJmpCode+1], eax;
    }
    WriteProcessMemory(hProcess, (LPVOID)(dwNOPAddr+5), g_abJmpCode, sizeof(g_abJmpCode), NULL);

    VirtualProtectEx(hProcess, (LPVOID)dwNOPAddr, 10, dwOldFlag, NULL);
    g_blHooked = TRUE;
    if(TRUE)
    return TRUE;
    HookLabel:
    NAKED_PROLOG ( ) ;
    int nx, ny;
    LPCSTR lp;
    lp = NULL;
    _asm
    {
    mov esi, ebp;
    add esi, 0Ch;
    lea edi, nx;
    movsd;
    lea edi, ny;
    movsd;

    lea edi, lp;
    movsd;
    }
    WriteLog_F("Try to ouput \"%s\" at (%d,%d)\n", lp, nx, ny);
    // Do the common epilog.
    EPILOG_COMMON ( ) ;
    NOPLabel:
    _asm NOP
    _asm NOP
    _asm NOP
    _asm NOP
    _asm NOP
    _asm NOP
    _asm NOP
    _asm NOP
    _asm NOP
    _asm NOP
    _asm NOP
    }
    LRESULT WINAPI UninstallTextoutHook()
    {
    if (!g_blHooked)
    return FALSE;
    //Restore the first 5 bytes code of TextOutA
    DWORD dwProcessId = GetCurrentProcessId();
    HANDLE hProcess = OpenProcess (PROCESS_ALL_ACCESS,
    FALSE, dwProcessId);
    if (NULL == hProcess)
    return FALSE;
    DWORD dwOldFlag;
    VirtualProtectEx(hProcess, g_oriTextout, 5, PAGE_READWRITE, &dwOldFlag);
    WriteProcessMemory(hProcess, g_oriTextout, g_abOriCode, sizeof(g_abOriCode), NULL);
    VirtualProtectEx(hProcess, g_oriTextout, 5, dwOldFlag, NULL);
    g_blHooked = FALSE;
    return TRUE;
    }
更多文章 更多内容请看Windows操作系统安全集  Windows操作系统安装  Windows频道专题,或
上一篇:只要有可能就推迟变量定义 人气:405
下一篇:Delphi中带缓存的数据更新技术 人气:917
浏览全部C/C++的内容 Dreamweaver插件下载 网页广告代码 祝你圣诞节快乐 2009年新年快乐