-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhook.c
129 lines (104 loc) · 3.12 KB
/
hook.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
#include "hook.h"
BYTE JMP[SIZE] = {0};
BYTE oldBytes[SIZE] = {0};
pBitBlt BitBlt_addr = NULL;
BOOL WINAPI DllMain(HINSTANCE hInst, DWORD dwReason, LPVOID lpReserved)
{
BOOL result = FALSE;
// get handle of gdi32.dll
HANDLE hGdi = GetModuleHandleA("gdi32.dll");
if (hGdi)
{
// get BitBlt base address
BitBlt_addr = (pBitBlt) GetProcAddress(hGdi, "BitBlt");
if (BitBlt_addr)
{
switch (dwReason)
{
case DLL_PROCESS_ATTACH:
result = install_hook();
break;
case DLL_PROCESS_DETACH:
result = remove_hook();
break;
}
}
CloseHandle(hGdi);
}
return result;
}
BOOL install_hook()
{
DWORD oldProtect;
BOOL result = FALSE;
BYTE tempJMP[SIZE] = { 0xE9, 0x90, 0x90, 0x90, 0x90, 0xC3 };
// copy trampoline code
memcpy(JMP, tempJMP, SIZE);
// calculate address
DWORD JMPSize = ((DWORD) fake_BitBlt - (DWORD) BitBlt_addr - 5);
// get write access
if (VirtualProtect((LPVOID) BitBlt_addr, SIZE,
PAGE_EXECUTE_READWRITE, &oldProtect))
{
// copy original code
memcpy(oldBytes, BitBlt_addr, SIZE);
// replace nops in trampoline with address
memcpy(&JMP[1], &JMPSize, 4);
// replace original code with trampoline
memcpy(BitBlt_addr, JMP, SIZE);
result = TRUE;
// restore protection
VirtualProtect((LPVOID)BitBlt_addr, SIZE, oldProtect, &oldProtect);
}
return result;
}
BOOL remove_hook()
{
DWORD oldProtect;
BOOL result = FALSE;
// get write access
if (VirtualProtect((LPVOID)BitBlt_addr, SIZE,
PAGE_EXECUTE_READWRITE, &oldProtect))
{
// restore original code
memcpy(BitBlt_addr, oldBytes, SIZE);
result = TRUE;
// restore protection
VirtualProtect((LPVOID)BitBlt_addr, SIZE, oldProtect, &oldProtect);
}
return result;
}
BOOL WINAPI fake_BitBlt(HDC hdcDest,
int nXDest,
int nYDest,
int nWidth,
int nHeight,
HDC hdcSrc,
int nXSrc,
int nYSrc,
DWORD dwRop)
{
BOOL result = FALSE;
if (SRCCOPY == dwRop)
{
SetLastError(ERROR_ACCESS_DENIED);
}
else
{
DWORD oldProtect;
// get write access
if (VirtualProtect((LPVOID)BitBlt_addr, SIZE,
PAGE_EXECUTE_READWRITE, &oldProtect))
{
// restore original code
memcpy(BitBlt_addr, oldBytes, SIZE);
// call original BitBlt function
result = BitBlt(hdcDest, nXDest, nYDest, nWidth, nHeight, hdcSrc, nXSrc, nYSrc, dwRop);
// replace original code with trampoline
memcpy(BitBlt_addr, JMP, SIZE);
// restore protection
VirtualProtect((LPVOID)BitBlt_addr, SIZE, oldProtect, &oldProtect);
}
}
return result;
}