通用Inline Hook代碼收藏

#include "inlinehook.h"



typedef struct _INLINE_HOOK_ITEM

{

    PBYTE    HookAddress;        //inlinehook 的位置

    DWORD    OrgBytesSize;        //

    //PBYTE    OrgBytes;            //原始函數字節

    PBYTE    HookBytes;            //HOOK代碼 = OrgBytesSize + 14字節

}INLINE_HOOK_ITEM, *PINLINE_HOOK_ITEM;



////////////////////////////////

// DisassembleMem32

////////////////////////////////

DWORD DisassembleMem32(PBYTE pbCode)

{

BYTE      bmodrm;



//----------------

bmodrm = *pbCode;



if (bmodrm >= 0xC0)

  return 1;



if (bmodrm >= 0x80)

  return ((bmodrm & 0x07) == 0x04 ? 6 : 5);



if (bmodrm >= 0x40)

  return ((bmodrm & 0x07) == 0x04 ? 3 : 2);



if ((bmodrm & 0x07) == 0x05)

  return 5;



if ((bmodrm & 0x07) == 0x04)

  return ((pbCode[1] & 0x07) == 0x05 ? 6 : 2);



return 1;

} //DisassembleMem32()





////////////////////////////////

// DisassembleProlog

////////////////////////////////

DWORD DisassembleProlog(

PBYTE      pbCode,

DWORD      cbMinimumRequired)

{

PBYTE      pb;

DWORD      cboperand;



//----------------

cboperand = 4;



for (pb = pbCode; (DWORD)(pb - pbCode) < cbMinimumRequired; )

{

  // Potemkin's Hackers Group rocks heavy metal-style (OPCODE.LST)



  switch (*pb++)

  {

  case 0x00:      // 00h: ADD mem8, reg8

  case 0x01:      // 01h: ADD mem, reg

  case 0x02:      // 02h: ADD reg8, mem8

  case 0x03:      // 03h: ADD reg, mem

  case 0x08:      // 08h: OR mem8, reg8

  case 0x09:      // 09h: OR mem, reg

  case 0x0A:      // 0Ah: OR reg8, mem8

  case 0x0B:      // 0Bh: OR reg, mem

  case 0x10:      // 10h: ADC mem8, reg8

  case 0x11:      // 11h: ADC mem, reg

  case 0x12:      // 12h: ADC reg8, mem8

  case 0x13:      // 13h: ADC reg, mem

  case 0x18:      // 18h: SBB mem8, reg8

  case 0x19:      // 19h: SBB mem, reg

  case 0x1A:      // 1Ah: SBB reg8, mem8

  case 0x1B:      // 1Bh: SBB reg, mem

  case 0x20:      // 20h: AND mem8, reg8

  case 0x21:      // 21h: AND mem, reg

  case 0x22:      // 22h: AND reg8, mem8

  case 0x23:      // 23h: AND reg, mem

  case 0x28:      // 28h: SUB mem8, reg8

  case 0x29:      // 29h: SUB mem, reg

  case 0x2A:      // 2Ah: SUB reg8, mem8

  case 0x2B:      // 2Bh: SUB reg, mem

  case 0x30:      // 30h: XOR mem8, reg8

  case 0x31:      // 31h: XOR mem, reg

  case 0x32:      // 32h: XOR reg8, mem8

  case 0x33:      // 33h: XOR reg, mem

  case 0x38:      // 38h: CMP mem8, reg8

  case 0x39:      // 39h: CMP mem, reg

  case 0x3A:      // 3Ah: CMP reg8, mem8

  case 0x3B:      // 3Bh: CMP reg, mem

  case 0x84:      // 84h: TEST mem8, reg8

  case 0x85:      // 85h: TEST mem, reg

  case 0x86:      // 86h: XCHG mem8, reg8

  case 0x87:      // 87h: XCHG mem, reg

  case 0x88:      // 88h: MOV mem8, reg8

  case 0x89:      // 89h: MOV mem, reg

  case 0x8A:      // 8Ah: MOV reg8, mem8

  case 0x8B:      // 8Bh: MOV reg, mem

  case 0x8C:      // 8Ch: mem, sreg

  case 0x8D:      // 8Dh: LEA reg, mem

  case 0x8E:      // 8Eh: sreg, mem

  case 0x8F:      // 8Fh: POP mem

  case 0xC4:      // C4h: LES reg, mem

  case 0xC5:      // C5h: LDS reg, mem

  case 0xD0:      // D0h: mem8, 1

  case 0xD1:      // D1h: mem, 1

  case 0xD2:      // D2h: mem8, CL

  case 0xD3:      // D3h: mem, CL

  case 0xFE:      // FEh: mem8

  case 0xFF:      // FFh: mem

    pb += DisassembleMem32(pb);

    break;



  case 0x04:      // 04h: ADD AL, imm8

  case 0x0C:      // 0Ch: OR AL, imm8

  case 0x14:      // 14h: ADC AL, imm8

  case 0x1C:      // 1Ch: SBB AL, imm8

  case 0x24:      // 24h: AND AL, imm8

  case 0x2C:      // 2Ch: SUB AL, imm8

  case 0x34:      // 34h: XOR AL, imm8

  case 0x3C:      // 3Ch: CMP AL, imm8

  case 0x6A:      // 6Ah: PUSH simm8

  case 0xA8:      // A8h: TEST AL, imm8

  case 0xB0:      // B0h: MOV AL, imm8

  case 0xB1:      // B1h: MOV CL, imm8

  case 0xB2:      // B2h: MOV DL, imm8

  case 0xB3:      // B3h: MOV BL, imm8

  case 0xB4:      // B4h: MOV AH, imm8

  case 0xB5:      // B5h: MOV CH, imm8

  case 0xB6:      // B6h: MOV DH, imm8

  case 0xB7:      // B7h: MOV BH, imm8

  case 0xD4:      // D4h: AAM imm8

  case 0xD5:      // D5h: AAD imm8

    pb++;

    break;



  case 0x05:      // 05h: ADD EAX, imm

  case 0x0D:      // 0Dh: OR EAX, imm

  case 0x15:      // 15h: ADC EAX, imm

  case 0x1D:      // 1Dh: SBB EAX, imm

  case 0x25:      // 25h: AND EAX, imm

  case 0x2D:      // 2Dh: SUB EAX, imm

  case 0x35:      // 35h: XOR EAX, imm

  case 0x3D:      // 3Dh: CMP EAX, imm

  case 0x68:      // 68h: PUSH imm

  case 0xA9:      // A9h: TEST EAX, imm

  case 0xB8:      // B8h: MOV EAX, imm

  case 0xB9:      // B9h: MOV ECX, imm

  case 0xBA:      // BAh: MOV EDX, imm

  case 0xBB:      // BBh: MOV EBX, imm

  case 0xBC:      // BCh: MOV ESP, imm

  case 0xBD:      // BDh: MOV EBP, imm

  case 0xBE:      // BEh: MOV ESI, imm

  case 0xBF:      // BFh: MOV EDI, imm

    pb += cboperand;

    break;



  case 0x06:      // 06h: PUSH ES

  case 0x07:      // 07h: POP ES

  case 0x0E:      // 0Eh: PUSH CS

  case 0x16:      // 16h: PUSH SS

  case 0x17:      // 17h: POP SS

  case 0x1E:      // 1Eh: PUSH DS

  case 0x1F:      // 1Fh: POP DS

  case 0x26:      // 26h: ES:

  case 0x27:      // 27h: DAA

  case 0x2E:      // 2Eh: CS:

  case 0x2F:      // 2Fh: DAS

  case 0x36:      // 36h: SS:

  case 0x37:      // 37h: AAA

  case 0x3E:      // 3Eh: DS:

  case 0x3F:      // 3Fh: AAS

  case 0x40:      // 40h: INC EAX

  case 0x41:      // 41h: INC ECX

  case 0x42:      // 42h: INC EDX

  case 0x43:      // 43h: INC EBX

  case 0x44:      // 44h: INC ESP

  case 0x45:      // 45h: INC EBP

  case 0x46:      // 46h: INC ESI

  case 0x47:      // 47h: INC EDI

  case 0x48:      // 48h: DEC EAX

  case 0x49:      // 49h: DEC ECX

  case 0x4A:      // 4Ah: DEC EDX

  case 0x4B:      // 4Bh: DEC EBX

  case 0x4C:      // 4Ch: DEC ESP

  case 0x4D:      // 4Dh: DEC EBP

  case 0x4E:      // 4Eh: DEC ESI

  case 0x4F:      // 4Fh: DEC EDI

  case 0x50:      // 50h: PUSH EAX

  case 0x51:      // 51h: PUSH ECX

  case 0x52:      // 52h: PUSH EDX

  case 0x53:      // 53h: PUSH EBX

  case 0x54:      // 54h: PUSH ESP

  case 0x55:      // 55h: PUSH EBP

  case 0x56:      // 56h: PUSH ESI

  case 0x57:      // 57h: PUSH EDI

  case 0x58:      // 58h: POP EAX

  case 0x59:      // 59h: POP ECX

  case 0x5A:      // 5Ah: POP EDX

  case 0x5B:      // 5Bh: POP EBX

  case 0x5C:      // 5Ch: POP ESP

  case 0x5D:      // 5Dh: POP EBP

  case 0x5E:      // 5Eh: POP ESI

  case 0x5F:      // 5Fh: POP EDI

  case 0x60:      // 60h: PUSHAD

  case 0x61:      // 61h: POPAD

  case 0x64:      // 64h: FS:

  case 0x90:      // 90h: NOP

  case 0x91:      // 91h: XCHG EAX, ECX

  case 0x92:      // 92h: XCHG EAX, EDX

  case 0x93:      // 93h: XCHG EAX, EBX

  case 0x94:      // 94h: XCHG EAX, ESP

  case 0x95:      // 95h: XCHG EAX, EBP

  case 0x96:      // 96h: XCHG EAX, ESI

  case 0x97:      // 97h: XCHG EAX, EDI

  case 0x98:      // 98h: CWDE

  case 0x99:      // 99h: CDQ

  case 0x9C:      // 9Ch: PUSHFD

  case 0x9D:      // 9Dh: POPFD

  case 0x9E:      // 9Eh: SAHF

  case 0x9F:      // 9Fh: LAHF

  case 0xA4:      // A4h: MOVSB

  case 0xA5:      // A5h: MOVSD

  case 0xA6:      // A6h: CMPSB

  case 0xA7:      // A7h: CMPSD

  case 0xAA:      // AAh: STOSB

  case 0xAB:      // ABh: STOSD

  case 0xAC:      // ACh: LODSB

  case 0xAD:      // ADh: LODSD

  case 0xAE:      // AEh: SCASB

  case 0xAF:      // AFh: SCASD

  case 0xC9:      // C9h: LEAVE

  case 0xD6:      // D6h: SETALC

  case 0xD7:      // D7h: XLAT

  case 0xF0:      // F0h: LOCK

  case 0xF2:      // F2h: REPNZ

  case 0xF3:      // F3h: REP

  case 0xF5:      // F5h: CMC

  case 0xF8:      // F8h: CLC

  case 0xF9:      // F9h: STC

  case 0xFC:      // FCh: CLD

  case 0xFD:      // FDh: STD

    break;



  case 0x66:      // 66h: memory access size prefix

    cboperand = 2;

    continue;



  case 0x69:      // 69h: IMUL reg, imm, mem

  case 0x81:      // 81h: mem, imm

  case 0xC7:      // C7h: MOV mem, imm

    pb += DisassembleMem32(pb) + cboperand;

    break;



  case 0x6B:      // 6Bh: IMUL reg8, imm8, mem8

  case 0x80:      // 80h: mem8, imm8

  case 0x82:      // 82h: mem8, simm8

  case 0x83:      // 83h: mem, simm8

  case 0xC0:      // C0h: mem8, imm8

  case 0xC1:      // C1h: mem, imm8

  case 0xC6:      // C6h: MOV mem8, imm8

    pb += DisassembleMem32(pb) + 1;

    break;



  case 0xA0:      // A0h: MOV AL, [ofs]

  case 0xA1:      // A1h: MOV EAX, [ofs]

  case 0xA2:      // A2h: MOV [ofs], AL

  case 0xA3:      // A3h: MOV [ofs], EAX

    pb += 4;

    break;



  case 0xC8:      // C8h: ENTER imm16, imm8

    pb += 3;

    break;



  case 0xF6:      // F6h/0: TEST mem8, imm8; F6h/{1..7}: mem8

    pb += DisassembleMem32(pb) + ((*pb & 0x38) == 0x00 ? 1 : 0);

    break;



  case 0xF7:      // F7h/0: TEST mem, imm; F7h/{1..7}: mem

    pb += DisassembleMem32(pb) + ((*pb & 0x38) == 0x00 ? cboperand : 0);

    break;



  case 0x0F:

    switch (*pb++)

    {

    case 0x0D:    // 0Fh/0Dh: mem

    case 0x18:    // 0Fh/18h: mem

    case 0x90:    // 0Fh/90h: SETO mem8

    case 0x91:    // 0Fh/91h: SETNO mem8

    case 0x92:    // 0Fh/92h: SETC mem8

    case 0x93:    // 0Fh/93h: SETNC mem8

    case 0x94:    // 0Fh/94h: SETZ mem8

    case 0x95:    // 0Fh/95h: SETNZ mem8

    case 0x96:    // 0Fh/96h: SETNA mem8

    case 0x97:    // 0Fh/97h: SETA mem8

    case 0x98:    // 0Fh/98h: SETS mem8

    case 0x99:    // 0Fh/99h: SETNS mem8

    case 0x9A:    // 0Fh/9Ah: SETP mem8

    case 0x9B:    // 0Fh/9Bh: SETNP mem8

    case 0x9C:    // 0Fh/9Ch: SETL mem8

    case 0x9D:    // 0Fh/9Dh: SETNL mem8

    case 0x9E:    // 0Fh/9Eh: SETNG mem8

    case 0x9F:    // 0Fh/9Fh: SETG mem8

    case 0xA3:    // 0Fh/A3h: BT mem, reg

    case 0xA5:    // 0Fh/A5h: SHLD mem, reg, CL

    case 0xAB:    // 0Fh/ABh: BTS mem, reg

    case 0xAD:    // 0Fh/ADh: SHRD mem, reg, CL

    case 0xAF:    // 0Fh/AFh: IMUL reg, mem

    case 0xB3:    // 0Fh/B3h: BTR mem, reg

    case 0xB4:    // 0Fh/B4h: LFS reg, mem

    case 0xB5:    // 0Fh/B5h: LGS reg, mem

    case 0xB6:    // 0Fh/B6h: MOVZX reg, mem8

    case 0xB7:    // 0Fh/B7h: MOVZX reg, mem16

    case 0xBB:    // 0Fh/BBh: BTC mem, reg

    case 0xBC:    // 0Fh/BCh: BSF mem, reg

    case 0xBD:    // 0Fh/BDh: BSR mem, reg

    case 0xBE:    // 0Fh/BEh: MOVSX reg, mem8

    case 0xBF:    // 0Fh/BFh: MOVSX reg, mem16

    case 0xC0:    // 0Fh/C0h: XADD mem8, reg8

    case 0xC1:    // 0Fh/C1h: XADD mem, reg

    case 0xC7:    // 0Fh/C7h/0: CMPXCHG8B mem

      pb += DisassembleMem32(pb);

      break;



    case 0xA0:    // 0Fh/A0h: PUSH FS

    case 0xA1:    // 0Fh/A1h: POP FS

    case 0xA8:    // 0Fh/A8h: PUSH GS

    case 0xA9:    // 0Fh/A9h: POP GS

    case 0xC8:    // 0Fh/C8h: BSWAP EAX

    case 0xC9:    // 0Fh/C9h: BSWAP ECX

    case 0xCA:    // 0Fh/CAh: BSWAP EDX

    case 0xCB:    // 0Fh/CBh: BSWAP EBX

    case 0xCC:    // 0Fh/CCh: BSWAP ESP

    case 0xCD:    // 0Fh/CDh: BSWAP EBP

    case 0xCE:    // 0Fh/CEh: BSWAP ESI

    case 0xCF:    // 0Fh/CFh: BSWAP EDI

      break;



    case 0xA4:    // 0Fh/A4h: SHLD mem, reg, imm8

    case 0xAC:    // 0Fh/ACh: SHRD mem, reg, imm8

    case 0xBA:    // 0Fh/BAh: mem, imm8

      pb += DisassembleMem32(pb) + 1;

      break;



    default:

      return 0;

    }

    break; //case 0x0F



  default:

    return 0;

  } //switch(*pb)



  cboperand = 4;

} //for(pb)



return (DWORD)(pb - pbCode);

} //DisassembleProlog()



__declspec(naked) void InLineHookHead()

{

    __asm

    {

        POP EAX;

        PUSH 0xAAAAAAAA;            //OrgFunction

        PUSH EAX;

        _emit 0xea;

        _emit 0xbb;

        _emit 0xbb;

        _emit 0xbb;

        _emit 0xbb;

        _emit 0x08;

        _emit 0x00;

        //POP EAX;                   

        //MOV EAX, 0xBBBBBBBB;        //MyHookFunction - 注意調用方式

        //CALL EAX;

        //INT 3;

        //ADD ESP, 8;

        //PUSH dword ptr [ESP - 8];

    }

}

void InLineHookHeadEnd(){}



DWORD

SetupInlineHook(

                IN OUT PBYTE FunctionAddress,

                IN PBYTE NewAddress

    )

{

    PINLINE_HOOK_ITEM hook_item = NULL;

    PBYTE jmp_back = NULL;



    UINT i, call_head_len;

   

    if (!FunctionAddress || !NewAddress)

        return 0;



    hook_item = ExAllocatePool(NonPagedPool, sizeof(INLINE_HOOK_ITEM));

    hook_item->HookAddress = FunctionAddress;

    hook_item->OrgBytesSize = DisassembleProlog(FunctionAddress, 7);    //JMP FAR 0008:0xffffffff

    call_head_len = (ULONG)InLineHookHeadEnd - (ULONG)InLineHookHead;//頭字節數



    hook_item->HookBytes = ExAllocatePool(NonPagedPool, hook_item->OrgBytesSize + call_head_len + 7);

    //------------------------------------------------------------

    //填寫HookHeader Bytes

    memcpy(hook_item->HookBytes, (PBYTE)InLineHookHead, call_head_len);

    for (i=0; i<call_head_len; i++)

    {

        if (*(PULONG)&hook_item->HookBytes == 0xAAAAAAAA)

        {

            *(PULONG)&hook_item->HookBytes = (ULONG)hook_item->HookBytes + call_head_len;

            i += 4;

        }

        if (*(PULONG)&hook_item->HookBytes == 0xBBBBBBBB)

        {

            *(PULONG)&hook_item->HookBytes = (ULONG)NewAddress;

            i += 4;

        }

    }

    //here is old bytes

    memcpy(hook_item->HookBytes + call_head_len, FunctionAddress, hook_item->OrgBytesSize);

    //7 bytes jmp back

    jmp_back = hook_item->HookBytes + call_head_len + hook_item->OrgBytesSize;

    jmp_back[0] = 0xEA;

    *(PULONG)&jmp_back[1] = (ULONG)(FunctionAddress + hook_item->OrgBytesSize);

    jmp_back[5] = 0x08;

    jmp_back[6] = 0x00;

    //------------------------------------------------------------

    //setup inline hook

    //------------------------------------------------------------

    _asm

    {

        MOV EAX, CR0;            //move CR0 register into EAX

        AND EAX, NOT 10000H;    //disable WP bit

        MOV CR0, EAX;            //write register back

    }

    hook_item->HookAddress[0] = 0xEA;//JMP FAR 0008:0xffffffff

    *(PULONG)&hook_item->HookAddress[1] = (ULONG)hook_item->HookBytes;

    hook_item->HookAddress[5] = 0x08;

    hook_item->HookAddress[6] = 0x00;

    for (i=7; i<hook_item->OrgBytesSize; i++)//fill nop

        hook_item->HookAddress = 0x90;

    _asm

    {

        MOV EAX, CR0;

        OR  EAX, 10000H;

        MOV CR0, EAX;

    }

    //------------------------------------------------------------

    KdPrint(("Hook At %08x/n", FunctionAddress));

   

    return (DWORD)hook_item;

}



//下面是簡單的測試--win2000以及win2003SP1測試通過



SetupInlineHook((PBYTE)PacketSend, (PBYTE)InLineHookPacketSend);



NDIS_STATUS

InLineHookPacketSend(

                     SEND_HANDLER                OrgPacketSend,

                     IN    NDIS_HANDLE                MacBindingHandle,

                     IN    PNDIS_PACKET            Packet

                     )

{



    KdPrint(("InLineHookPacketSend %08x, %08x, %08x!!!/n", OrgPacketSend, MacBindingHandle, Packet));

    return OrgPacketSend(MacBindingHandle, Packet);   

}
發佈了38 篇原創文章 · 獲贊 5 · 訪問量 11萬+
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章