dll注入

    DWORD pid = 0x590;  
       
        // 得到目标进程句柄
        HANDLE hRemoteProcess = OpenProcess(PROCESS_ALL_ACCESS, FALSE, pid);
    
        char fileName[] = "c:\\my.dll";
        int cb = (1 + sizeof(fileName));

        LPVOID remoteAddress = (LPVOID) VirtualAllocEx( hRemoteProcess, NULL, 0x1000, MEM_COMMIT, PAGE_READWRITE);
        int iReturnCode = WriteProcessMemory(hRemoteProcess, remoteAddress, (PVOID) fileName, cb, NULL);
        
        LPTHREAD_START_ROUTINE  pfnStartAddr = (LPTHREAD_START_ROUTINE )GetProcAddress(GetModuleHandle("Kernel32.dll"), "LoadLibraryA");
        CreateRemoteThread( hRemoteProcess, NULL, 0, pfnStartAddr, remoteAddress, 0, NULL);
      
        //VirtualFreeEx();
        VirtualFreeEx(hRemoteProcess, remoteAddress, 0x1000, MEM_DECOMMIT);
最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
平台声明:文章内容(如有图片或视频亦包括在内)由作者上传并发布,文章内容仅代表作者本人观点,简书系信息发布平台,仅提供信息存储服务。

推荐阅读更多精彩内容