钩子编程

钩子编程

虚函数表挂钩

编辑

C++使用虚函数,因此可在运行时直接修改虚函数表的内容来挂钩。 Window上很多软件库以COM方式提供的(如DirectX), 所以有需求拦截COM调用的COM Hook。COM里的接口是C++虚表的形式提供的,所以COM的Hook其实就是虚表(vtable)的Hook。ATL就是用接口替代的方式来调试和记录COM接口引用计数的次数

class VirtualTable { // example class

public:

virtual void VirtualFunction01( ticket );

};

void VirtualTable::VirtualFunction01( ticket ) {

printf("VirtualFunction01 called");

}

typedef void ( __thiscall* VirtualFunction01_t )( ticket* thisptr );

VirtualFunction01_t g_org_VirtualFunction01;

//our detour function

void __fastcall hk_VirtualFunction01( ticket* thisptr, int edx ) {

printf("Custom function called");

//call the original function

g_org_VirtualFunction01(thisptr);

}

int _tmain(int argc, _TCHAR* argv[]) {

DWORD oldProtection;

VirtualTable* myTable = new VirtualTable();

void** base = *(void***)myTable;

VirtualProtect( &base[0], 4, PAGE_EXECUTE_READWRITE, &oldProtection );

//save the original function

g_org_VirtualFunction01 = (VirtualFunction01_t)base[0];

//overwrite

base[0] = &hk_VirtualFunction01;

VirtualProtect( &base[0], 4, oldProtection, 0 );

//call the virtual function (now hooked) from our class instance

myTable->VirtualFunction01();

return 0;

}

C#键盘事件钩子

编辑

using System.Runtime.InteropServices;

namespace Hooks

{

public class KeyHook

{

/* Member variables */

protected static int Hook;

protected static LowLevelKeyboardDelegate Delegate;

protected static readonly object Lock = new object();

protected static bool IsRegistered = false;

/* DLL imports */

[DllImport("user32")]

private static extern int SetWindowsHookEx(int idHook, LowLevelKeyboardDelegate lpfn,

int hmod, int dwThreadId);

[DllImport("user32")]

private static extern int CallNextHookEx(int hHook, int nCode, int wParam, KBDLLHOOKSTRUCT lParam);

[DllImport("user32")]

private static extern int UnhookWindowsHookEx(int hHook);

/* Types & constants */

protected delegate int LowLevelKeyboardDelegate(int nCode, int wParam, ref KBDLLHOOKSTRUCT lParam);

private const int HC_ACTION = 0;

private const int WM_KEYDOWN = 0x0100;

private const int WM_KEYUP = 0x0101;

private const int WH_KEYBOARD_LL = 13;

[StructLayout(LayoutKind.Sequential)]

public struct KBDLLHOOKSTRUCT

{

public int vkCode;

public int scanCode;

public int flags;

public int time;

public int dwExtraInfo;

}

/* Methods */

private static int LowLevelKeyboardHandler(int nCode, int wParam, ref KBDLLHOOKSTRUCT lParam)

{

if (nCode == HC_ACTION)

{

if (wParam == WM_KEYDOWN)

System.Console.Out.WriteLine("Key Down: " + lParam.vkCode);

else if (wParam == WM_KEYUP)

System.Console.Out.WriteLine("Key Up: " + lParam.vkCode);

}

return CallNextHookEx(Hook, nCode, wParam, lParam);

}

public static bool RegisterHook()

{

lock (Lock)

{

if (IsRegistered)

return true;

Delegate = LowLevelKeyboardHandler;

Hook = SetWindowsHookEx(

WH_KEYBOARD_LL, Delegate,

Marshal.GetHINSTANCE(

System.Reflection.Assembly.GetExecutingAssembly().GetModules()[0]

).ToInt32(), 0

);

if (Hook != 0)

return IsRegistered = true;

Delegate = null;

return false;

}

}

public static bool UnregisterHook()

{

lock (Lock)

{

return IsRegistered = (UnhookWindowsHookEx(Hook) != 0);

}

}

}

}

使用跳转指令的API/函数钩子拦截

编辑

下述例子使用JMP(英语:JMP (x86 instruction))指令,修改windows API中的MessageBoxW函数的前6个字节执行其他代码。这段代码编译为DLL文件,采用DLL注入技术让应用程序使用。[1]微软提供了封装好的Detours库用于此目的。

/*

This idea is based on chrom-lib approach, Distributed under GNU LGPL License.

Source chrom-lib: https://github.com/linuxexp/chrom-lib

Copyright (C) 2011 Raja Jamwal

*/

#include

#define SIZE 6

typedef int (WINAPI *pMessageBoxW)(HWND, LPCWSTR, LPCWSTR, UINT); // Messagebox prototype

int WINAPI MyMessageBoxW(HWND, LPCWSTR, LPCWSTR, UINT); // Our detour

void BeginRedirect(LPVOID);

pMessageBoxW pOrigMBAddress = NULL; // address of original

BYTE oldBytes[SIZE] = {0}; // backup

BYTE JMP[SIZE] = {0}; // 6 byte JMP instruction

DWORD oldProtect, myProtect = PAGE_EXECUTE_READWRITE;

INT APIENTRY DllMain(HMODULE hDLL, DWORD Reason, LPVOID Reserved)

{

switch(Reason)

{

case DLL_PROCESS_ATTACH: // if attached

pOrigMBAddress = (pMessageBoxW)

GetProcAddress(GetModuleHandle("user32.dll"), // get address of original

"MessageBoxW");

if(pOrigMBAddress != NULL)

BeginRedirect(MyMessageBoxW); // start detouring

break;

case DLL_PROCESS_DETACH:

memcpy(pOrigMBAddress, oldBytes, SIZE); // restore backup

case DLL_THREAD_ATTACH:

case DLL_THREAD_DETACH:

break;

}

return TRUE;

}

void BeginRedirect(LPVOID newFunction)

{

BYTE tempJMP[SIZE] = {0xE9, 0x90, 0x90, 0x90, 0x90, 0xC3}; // 0xE9 = JMP 0x90 = NOP 0xC3 = RET

memcpy(JMP, tempJMP, SIZE); // store jmp instruction to JMP

DWORD JMPSize = ((DWORD)newFunction - (DWORD)pOrigMBAddress - 5); // calculate jump distance

VirtualProtect((LPVOID)pOrigMBAddress, SIZE, // assign read write protection

PAGE_EXECUTE_READWRITE, &oldProtect);

memcpy(oldBytes, pOrigMBAddress, SIZE); // make backup

memcpy(&JMP[1], &JMPSize, 4); // fill the nop's with the jump distance (JMP,distance(4bytes),RET)

memcpy(pOrigMBAddress, JMP, SIZE); // set jump instruction at the beginning of the original function

VirtualProtect((LPVOID)pOrigMBAddress, SIZE, oldProtect, NULL); // reset protection

}

int WINAPI MyMessageBoxW(HWND hWnd, LPCWSTR lpText, LPCWSTR lpCaption, UINT uiType)

{

VirtualProtect((LPVOID)pOrigMBAddress, SIZE, myProtect, NULL); // assign read write protection

memcpy(pOrigMBAddress, oldBytes, SIZE); // restore backup

int retValue = MessageBoxW(hWnd, lpText, lpCaption, uiType); // get return value of original function

memcpy(pOrigMBAddress, JMP, SIZE); // set the jump instruction again

VirtualProtect((LPVOID)pOrigMBAddress, SIZE, oldProtect, NULL); // reset protection

return retValue; // return original return value

}

Netfilter钩子

编辑

使用Netfilter钩子修改Linux内核的网络交通。

#include

#include

#include

#include

#include

#include

#include

#include

/* Port we want to drop packets on */

static const uint16_t port = 25;

/* This is the hook function itself */

static unsigned int hook_func(unsigned int hooknum,

struct sk_buff **pskb,

const struct net_device *in,

const struct net_device *out,

int (*okfn)(struct sk_buff *))

{

struct iphdr *iph = ip_hdr(*pskb);

struct tcphdr *tcph, tcpbuf;

if (iph->protocol != IPPROTO_TCP)

return NF_ACCEPT;

tcph = skb_header_pointer(*pskb, ip_hdrlen(*pskb), sizeof(*tcph), &tcpbuf);

if (tcph == NULL)

return NF_ACCEPT;

return (tcph->dest == port) ? NF_DROP : NF_ACCEPT;

}

/* Used to register our hook function */

static struct nf_hook_ops nfho = {

.hook = hook_func,

.hooknum = NF_IP_PRE_ROUTING,

.pf = NFPROTO_IPV4,

.priority = NF_IP_PRI_FIRST,

};

static __init int my_init(void)

{

return nf_register_hook(&nfho);

}

static __exit void my_exit(void)

{

nf_unregister_hook(&nfho);

}

module_init(my_init);

module_exit(my_exit);

内部IAT钩子

编辑

下例展示通过修改可执行程序的输入地址表(IAT),把钩子函数替代原函数。

#include

typedef int(__stdcall *pMessageBoxA) (HWND hWnd, LPCSTR lpText, LPCSTR lpCaption, UINT uType); //This is the 'type' of the MessageBoxA call.

pMessageBoxA RealMessageBoxA; //This will store a pointer to the original function.

void DetourIATptr(const char* function, void* newfunction, HMODULE module);

int __stdcall NewMessageBoxA(HWND hWnd, LPCSTR lpText, LPCSTR lpCaption, UINT uType) { //Our fake function

printf("The String Sent to MessageBoxA Was : %s\n", lpText);

return RealMessageBoxA(hWnd, lpText, lpCaption, uType); //Call the real function

}

int main(int argc, CHAR *argv[]) {

DetourIATptr("MessageBoxA",(void*)NewMessageBoxA,0); //Hook the function

MessageBoxA(NULL, "Just A MessageBox", "Just A MessageBox", 0); //Call the function -- this will invoke our fake hook.

return 0;

}

void **IATfind(const char *function, HMODULE module) { //Find the IAT (Import Address Table) entry specific to the given function.

int ip = 0;

if (module == 0)

module = GetModuleHandle(0);

PIMAGE_DOS_HEADER pImgDosHeaders = (PIMAGE_DOS_HEADER)module;

PIMAGE_NT_HEADERS pImgNTHeaders = (PIMAGE_NT_HEADERS)((LPBYTE)pImgDosHeaders + pImgDosHeaders->e_lfanew);

PIMAGE_IMPORT_DESCRIPTOR pImgImportDesc = (PIMAGE_IMPORT_DESCRIPTOR)((LPBYTE)pImgDosHeaders + pImgNTHeaders->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT].VirtualAddress);

if (pImgDosHeaders->e_magic != IMAGE_DOS_SIGNATURE)

printf("libPE Error : e_magic is no valid DOS signature\n");

for (IMAGE_IMPORT_DESCRIPTOR *iid = pImgImportDesc; iid->Name != NULL; iid++) {

for (int funcIdx = 0; *(funcIdx + (LPVOID*)(iid->FirstThunk + (SIZE_T)module)) != NULL; funcIdx++) {

char *modFuncName = (char*)(*(funcIdx + (SIZE_T*)(iid->OriginalFirstThunk + (SIZE_T)module)) + (SIZE_T)module + 2);

const uintptr_t nModFuncName = (uintptr_t)modFuncName;

bool isString = !(nModFuncName & (sizeof(nModFuncName) == 4 ? 0x80000000 : 0x8000000000000000));

if (isString) {

if (!_stricmp(function, modFuncName))

return funcIdx + (LPVOID*)(iid->FirstThunk + (SIZE_T)module);

}

}

}

return 0;

}

void DetourIATptr(const char *function, void *newfunction, HMODULE module) {

void **funcptr = IATfind(function, module);

if (*funcptr == newfunction)

return;

DWORD oldrights, newrights = PAGE_READWRITE;

//Update the protection to READWRITE

VirtualProtect(funcptr, sizeof(LPVOID), newrights, &oldrights);

RealMessageBoxA = (pMessageBoxA)*funcptr; //Some compilers require the cast like "MinGW" not sure about MSVC

*funcptr = newfunction;

//Restore the old memory protection flags.

VirtualProtect(funcptr, sizeof(LPVOID), oldrights, &newrights);

}

Windows API提供的挂钩函数

编辑

SetWinEventHook:基本没有权限问题,也就是说这个API可以Hook到高权限程序的事件,同时支持进程内(WINEVENT_INCONTEXT)和进程外(WINEVENT_OUTOFCONTEXT)2种Hook方式,可以进程外的方式Hook到64位程序的事件。

SetWindowsHookEx:64位编程情形,32位DLL没法直接注入到64位的应用程序里面, 因为地址空间完全不一样。UAC打开的情况下低权限程序没法Hook高权限程序。对于64位问题,解决方法是提供2个DLL,分别可以Hook32和64位程序。对于权限问题,通过注册系统服务,由服务进程创建工作进程。因为Windows Vista开始有了Session隔离机制,服务进程运行在Session 0,用户程序运行在Session 1, Session 2等,如果直接在服务程序里干活,我们就只能在Session 0里工作。通过创建进程,可以在DuplicateTokenEx后将Token的SessionID设置成目标Session,并且在CreateProcessAsUser时指定目标WinStation和Desktop, 这样就获得了System权限,并且也可以和当前桌面进程交互。

相关推荐

释放潜力
万博365下载

释放潜力

📅 06-29 👁️ 9515
【赏金令季末总结】带你总结23S3赏金令赛季,过载皮肤凑齐了吗?
一种疗效显著的刮痧法
365bet娱乐场平台

一种疗效显著的刮痧法

📅 07-10 👁️ 9476