Giriş yap
En iyi yollayıcılar
Hello EMO | ||||
EMO | ||||
eMoStyLe | ||||
BesimBICER | ||||
GameKinG | ||||
Crysis | ||||
~>!.DεvιLρяιεsт.!<~ | ||||
MeTaL | ||||
TrueCrime | ||||
djhayal3t |
Istatistikler
Toplam 203 kayıtlı kullanıcımız varSon kaydolan kullanıcımız: crayzboy76
Kullanıcılarımız toplam 1186 mesaj attılar bunda 862 konu
Arama
Sosyal yer imi
Sosyal bookmarking sitesinde Emo, Emo nedir, Emo resimleri, Emo Kıyafetleri, Emo Sözleri, Emo Oyunları, EmoTurkey, Emo Nickler, Emo Avatarları, Punk, Punk Resimleri, Punk Avatarları, Rock, Rock Resimleri, Rock Avatarları, Msn Nickleri, Msn Avatarları, Müzik adresi saklayın ve paylaşın
Sosyal bookmarking sitesinde EMO Style ForumPro - Hos Geldiniz adresi saklayın ve paylaşın
Kimler hatta?
Toplam 11 kullanıcı online :: 0 Kayıtlı, 0 Gizli ve 11 Misafir Yok
Sitede bugüne kadar en çok 217 kişi C.tesi Tem. 29, 2017 1:46 am tarihinde online oldu.
En son konular
Reklam
Patching A Processes Memory Without Injecting
1 sayfadaki 1 sayfası
Patching A Processes Memory Without Injecting
[QUOTE=sAtAn;254535]Small Tutorial On Patching A Processes Memory Without Injecting A Dll:
It is really not needed cause you can make a pointer directly if you like.
- RetarT -[/QUOTE]
- Kod:
ReadProcessMemory(
hProcess, // handle to the process which you want to patch
(void*)0x[b]OffsetHere[/b], // offset to the function you want to read
(void*)Pointer, // pointer to get the function offset e.g. origin function
4, // size to read most of the time this is 4 or 6 the sizeof(DWORD)
0 ); // number bytes read not really needed
It is really not needed cause you can make a pointer directly if you like.
- Kod:
// [b]Typedef Calling[/b]
typedef int ( *FuncPtr ) ( void );
FuncPtr Org_Pointer = ( FuncPtr ) ( 0xOffsetHere );
// Nows hold the original function
Org_Pointer( );
// So calling from the hooked is easy which so it doesn't [i]crash the process[/i]
// [b]Indirect Calling[/b]
DWORD * dwPointer = ( DWORD* ) ( 0xOffsetHere );
DWORD dwOrg_Pointer = NULL;
// Set [i]dwOrg_Pointer[/i] as a [i]reference[/i] to [b]dwPointer[/b]
dwOrg_Pointer = *dwPointer;
// This is a bit more confusing a [b]Indirect Pointer[/b] to the function which can be called via inline assemble
_asm
{
call dwPointer // Must be called inside the hooked function
}
// Now if the function you are hooking has Arguments and you want to use the [b]Indirect Pointer[/b] you must
// push these Arguments on to the stack before calling the function
_asm
{
push argumentC
push argumentB
push argumentA
call ArgumentFunction
}
// Since the stack is Last In First Out( LIFO ) you have push the arguments on backwards e.g.
// Say this is [b]ArgumentFunction[/b]
void ArgumentFunction ( int argumentA, int argumentB, int argumentC );
// Pushing the Arguments goes like so
push argumentC
push argumentB
push argumentA
- Kod:
WriteProcessMemory(
hProcess, // handle to the process which you want to patch
(void*)0x[b]OffsetHere[/b], // offset to the function you which was read or the address you want
(void*)Pointer, // pointer to the hooked function
4, // size to read most of the time this is 4 or 6 the sizeof(DWORD)
0 ); // number bytes read not really needed
// This method is more likly to be used with [b]Typedef Calling[/b] and not [b]Indirect Calling[/b].
// But still isn't needed at all if you know alot aboput pointer's. Since everything is covered now i'm done
// [b]Indirect Calling[/b] Patch
dwPointer = &Hooked_Function;
// Pie?
- RetarT -[/QUOTE]
Similar topics
» Patching A Processes Memory Without Injecting
» Injecting into a running process!
» packet injecting source v.137.2
» Changing a memory value. C#
» Changing memory values.
» Injecting into a running process!
» packet injecting source v.137.2
» Changing a memory value. C#
» Changing memory values.
1 sayfadaki 1 sayfası
Bu forumun müsaadesi var:
Bu forumdaki mesajlara cevap veremezsiniz
Cuma Ağus. 29, 2014 8:33 am tarafından Hello EMO
» goldenchase.net maden yaparak para kazanma
Cuma Ağus. 29, 2014 8:18 am tarafından Hello EMO
» etichal hacker görsel egitim seti
Çarş. Ağus. 06, 2014 4:57 am tarafından Hello EMO
» KO TBL Source C#
Ptsi Ara. 09, 2013 6:36 am tarafından Hello EMO
» x86 Registers
C.tesi Ağus. 24, 2013 5:02 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de WYD
Çarş. Tem. 10, 2013 7:25 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de CS Metodo²
Çarş. Tem. 10, 2013 7:23 am tarafından Hello EMO
» [Tutorial] Aprendendo basico deASM OLLYDBG
Çarş. Tem. 10, 2013 7:22 am tarafından Hello EMO
» Basic C# DLL injector
Ptsi Tem. 08, 2013 7:48 am tarafından Hello EMO