__if_exists(_GetAttrEntries) {{NULL, (DWORD_PTR)_GetAttrEntries, _ChainAttr }, }/ {NULL, 0, 0}}; / ...COM_INTERFACE_ENTRY_CACHED_TEAR_OFF(iid, x, punk) 缓存tear-off // {&iid,(DWORD_PTR)&ATL::...COM_INTERFACE_ENTRY_AGGREGATE(iid, punk) // {&iid,(DWORD_PTR)offsetof(_ComMapClass, punk...),_Delegate}, static HRESULT WINAPI _Delegate(void* pv, REFIID iid, void** ppvObject, DWORD_PTR dw)... dw) { _ATL_CHAINDATA* pcd = (_ATL_CHAINDATA*)dw; void* p = (void*)((DWORD_PTR)pv
[15] = (DWORD_PTR)vtStack + 0x9000; 14 和 15 分别对应 vtRSP 和 vtRBP。...[6] = (DWORD_PTR)pOutputData; vtRegs[3] = commandParaLength; vtRegs[2] = (DWORD_PTR)commandPara; vtRegs...[14] = vtRegs[14] - sizeof(DWORD_PTR); (3) 解析自定义汇编指令 根据 指令地址_助记符_位数1_操作数1_位数2_操作数2 的格式将每条指令的元素解析出来。...void AsmCall(DWORD_PTR opAddr1, PDWORD_PTR pVtRegs) { // 保存真实栈顶栈底 DWORD_PTR realRSP; DWORD_PTR...DWORD_PTR vtRBP = pVtRegs[15]; __asm { mov rax, vtRAX ......
DWORD_PTR xxGetNtoskrnlAddress(VOID) { DWORD_PTR AddrList[500] = { 0 }; DWORD cbNeeded = 0;...DWORD_PTR xxGetSysPROCESS(VOID) { DWORD_PTR Module = 0x00; DWORD_PTR NtAddr = 0x00; Module...= (DWORD_PTR)LoadLibraryA("ntkrnlpa.exe"); NtAddr = (DWORD_PTR)GetProcAddress((HMODULE)Module, "...DWORD_PTR xxGetTarPROCESS(DWORD_PTR SysPROC) { if (SysPROC == 0x00) { return 0x00;...BOOL xxModifyTokenPointer(DWORD_PTR dstPROC, DWORD_PTR srcPROC) { if (dstPROC == 0x00 || srcPROC
)IMAGE_FIRST_SECTION(hookedNtHeader) + ((DWORD_PTR)IMAGE_SIZEOF_SECTION_HEADER * i)); if (!...)ntdllBase + (DWORD_PTR)hookedSectionHeader->VirtualAddress), hookedSectionHeader->Misc.VirtualSize,...PAGE_EXECUTE_READWRITE, &oldProtection); memcpy((LPVOID)((DWORD_PTR)ntdllBase + (DWORD_PTR)hookedSectionHeader...->VirtualAddress), (LPVOID)((DWORD_PTR)ntdllMappingAddress + (DWORD_PTR)hookedSectionHeader->VirtualAddress...), hookedSectionHeader->Misc.VirtualSize); isProtected = VirtualProtect((LPVOID)((DWORD_PTR)ntdllBase
nMonth); wsprintf(szDay, TEXT("%d"), nDay); LPWSTR lpSource = (LPWSTR)TEXT("今天是:%1年%2月%3日"); DWORD_PTR...pArgs[] = { (DWORD_PTR)szYear, (DWORD_PTR)szMonth, (DWORD_PTR)szDay }; const DWORD size = 100 +
winternl.h> #include "syscalls.h" CHAR SyscallStub[SYSCALL_STUB_SIZE] = {}; PVOID RVAtoRawOffset(DWORD_PTR...bStubFound = FALSE; for (size_t i = 0; i NumberOfNames; i++) { DWORD_PTR...functionNameVA = (DWORD_PTR)RVAtoRawOffset((DWORD_PTR)fileData + pdwAddressOfNames[i], rdataSection...); DWORD_PTR functionVA = (DWORD_PTR)RVAtoRawOffset((DWORD_PTR)fileData + pdwAddressOfFunctions...(PIMAGE_DOS_HEADER)NtdllInfo->lpRawData; PIMAGE_NT_HEADERS imageNTHeaders = (PIMAGE_NT_HEADERS)((DWORD_PTR
DbgkOpenProcessDebugPort在NtQueryInformationProcess+0x19d7de处: 查看NtQueryInformationProcess+0x19d7de-9: 所以第一个特征码产生了: (*(DWORD_PTR...完整定位代码为: UNICODE_STRING funcName; RtlInitUnicodeString(&funcName, L"NtQueryInformationProcess"); DWORD_PTR...Address = (DWORD_PTR)MmGetSystemRoutineAddress(&funcName); for (size_t i = 0; i < 0x200000; i++) {...if ((*(DWORD_PTR*)(Address + i)) == 0x244c8b48d5b60f41 && (*(DWORD_PTR*)(Address + i +0xE)) == 0x0098248c8b48d88b...ObjectTypeOffset = 0; DWORD64 ObjectTypeAddress = 0; for (size_t i = 0; i < 0x200000; i++) { if ((*(DWORD_PTR
(WINAPI *LoadLibraryAF)(LPCSTR lpFileName); LoadLibraryAF pLoadLibraryA = NULL; DWORD i; if (((DWORD_PTR...dwOrdinalBase + pExportDirectory->NumberOfFunctions) return NULL; pAddress = (FARPROC)(pBaseAddress + (DWORD_PTR...for (i = 0; i NumberOfNames; i++) { char *szName = (char*)pBaseAddress + (DWORD_PTR
remoteModuleName[128] = {}; HMODULE serviceModule = NULL; MODULEINFO serviceModuleInfo = {}; DWORD_PTR...threadEntry.th32ThreadID); NtQueryInformationThread(threadHandle, (THREADINFOCLASS)0x9, &threadStartAddress, sizeof(DWORD_PTR...Check if thread's start address is inside wevtsvc.dll memory range if (threadStartAddress >= (DWORD_PTR...)serviceModuleInfo.lpBaseOfDll && threadStartAddress <= (DWORD_PTR)serviceModuleInfo.lpBaseOfDll + serviceModuleInfo.SizeOfImage
SetThreadAffinityMask函数定义 SetThreadAffinityMask的定义如下: DWORD_PTR SetThreadAffinityMask( [in] HANDLE...hThread, [in] DWORD_PTR dwThreadAffinityMask ); 从函数的定义看需要传递两个参数: hThread:指向要设置处理器关联的线程句柄。...是一个DWORD_PTR类型的值,长度共8个字节(64bit),每一bit代表一个cpu核。...函数定义如下: BOOL SetProcessAffinityMask( [in] HANDLE hProcess, [in] DWORD_PTR dwProcessAffinityMask
MAKEWORD的定义如下 #define MAKEWORD(a, b) ((WORD)(((BYTE)(((DWORD_PTR)(a)) & 0xff)) | ((WORD)((BYTE)(...((DWORD_PTR)(b)) & 0xff))) << 8)) 2 if (LOBYTE(inet_WsaData.wVersion) !...= 0)用于检测当前的Socket是否为2.0 LOBYTE和HIBYTE是两个宏,在vs2013里定义如下 #define LOBYTE(w) ((BYTE)(((DWORD_PTR...)(w)) & 0xff)) #define HIBYTE(w) ((BYTE)((((DWORD_PTR)(w)) >> 8) & 0xff)) WSACleanup();用于解除与
}; BYTE HookCode[12] = { 0x48, 0xB8, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0xFF, 0xE0 }; DWORD_PTR...return 1; } int main(int argc,char * argv[]) { HMODULE hwnd = GetModuleHandle(TEXT("user32.dll")); DWORD_PTR...base = (DWORD_PTR)GetProcAddress(hwnd, "MessageBoxW"); DWORD OldProtect; if (VirtualProtect((LPVOID...0x90, 0x90, 0x90, 0xFF, 0xE0 }; void Hook(LPCWSTR lpModule, LPCSTR lpFuncName, LPVOID lpFunction) { DWORD_PTR...::m_bOldBytes, 12); } BOOL MyHook::Hook(LPCWSTR lpModule, LPCSTR lpFuncName, LPVOID lpFunction) { DWORD_PTR
HOOK_TYPE IsHooked(LPCVOID lpFuncAddress, DWORD_PTR *dwAddressOffset) { LPCBYTE lpBytePtr = (LPCBYTE...return HOOK_ABOLSUTE; } return HOOK_NONE; } LPVOID lpFunction = ...; DWORD_PTR...else if (ht == HOOK_RELATIVE) { INT nJumpSize = (*(PINT)((LPBYTE)lpFunction + dwOffset); DWORD_PTR...dwRelativeAddress = (DWORD_PTR)((LPBYTE)lpFunction + dwOffset + 4)); dwHookAddress = (LPVOID)
lpMinimumApplicationAddress: Pointer; lpMaximumApplicationAddress: Pointer; dwActiveProcessorMask: DWORD_PTR
)IMAGE_FIRST_SECTION(hookedNtHeader) + ((DWORD_PTR)IMAGE_SIZEOF_SECTION_HEADER * i));...)ntdllBase + (DWORD_PTR)hookedSectionHeader->VirtualAddress), hookedSectionHeader->Misc.VirtualSize,...PAGE_EXECUTE_READWRITE, &oldProtection); memcpy((LPVOID)((DWORD_PTR)ntdllBase + (DWORD_PTR...)hookedSectionHeader->VirtualAddress), (LPVOID)((DWORD_PTR)ntdllMappingAddress + (DWORD_PTR)hookedSectionHeader...)ntdllBase + (DWORD_PTR)hookedSectionHeader->VirtualAddress), hookedSectionHeader->Misc.VirtualSize,
offsetAddress = (DWORD_PTR)HookedMessageBox - (DWORD_PTR)oldAddress - 5; char patch[6] = { 0xE9,...(PVOID callerAddress) { SYSTEM_INFO si; GetSystemInfo(&si); DWORD PageSize = si.dwPageSize; DWORD_PTR...dwMin = (DWORD_PTR)si.lpMinimumApplicationAddress; DWORD_PTR dwMax = (DWORD_PTR)si.lpMaximumApplicationAddress...PAGE_EXECUTE_READ || mbi.Protect == PAGE_READWRITE)) { if (callerAddress >= mbi.BaseAddress && (DWORD_PTR...)callerAddress <= (DWORD_PTR)mbi.BaseAddress + mbi.RegionSize) { currentMbi = mbi; cout
的支持 ATL通过下面两个宏实现对tear-off外部组件的支持 #define COM_INTERFACE_ENTRY_TEAR_OFF(iid, x)/ {&iid,/ (DWORD_PTR.../ _Creator}, #define COM_INTERFACE_ENTRY_CACHED_TEAR_OFF(iid, x, punk)/ {&iid,/ (DWORD_PTR...&ATL::_CComCacheData</ ATL::CComCreator >,/ (DWORD_PTR
}; BYTE HookCode[12] = { 0x48, 0xB8, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0xFF, 0xE0 }; DWORD_PTR...return 1; } int main(int argc,char * argv[]) { HMODULE hwnd = GetModuleHandle(TEXT("user32.dll")); DWORD_PTR...base = (DWORD_PTR)GetProcAddress(hwnd, "MessageBoxW"); DWORD OldProtect; if (VirtualProtect((LPVOID...0x90, 0x90, 0x90, 0xFF, 0xE0 }; void Hook(LPCWSTR lpModule, LPCSTR lpFuncName, LPVOID lpFunction) { DWORD_PTR...} // 开始挂钩 BOOL Hook(LPCWSTR lpModule, LPCSTR lpFuncName, LPVOID lpFunction) { DWORD_PTR
语法 BOOL SetProcessAffinityMask( [in] HANDLE hProcess, [in] DWORD_PTR dwProcessAffinityMask );...语法 C++复制 DWORD_PTR SetThreadAffinityMask( [in] HANDLE hThread, [in] DWORD_PTR dwThreadAffinityMask
0x00 };BYTE HookCode[12] = { 0x48, 0xB8, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0xFF, 0xE0 };DWORD_PTR...return 1;}int main(int argc,char * argv[]){ HMODULE hwnd = GetModuleHandle(TEXT("user32.dll")); DWORD_PTR...base = (DWORD_PTR)GetProcAddress(hwnd, "MessageBoxW"); DWORD OldProtect; if (VirtualProtect((LPVOID...0x90, 0x90, 0x90, 0xFF, 0xE0 };void Hook(LPCWSTR lpModule, LPCSTR lpFuncName, LPVOID lpFunction){ DWORD_PTR...12); } // 开始挂钩 BOOL Hook(LPCWSTR lpModule, LPCSTR lpFuncName, LPVOID lpFunction) { DWORD_PTR
领取专属 10元无门槛券
手把手带您无忧上云