forked from Ox18/cheatmatrix-gunbound
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathInjectUnit.pas
More file actions
200 lines (166 loc) · 6.42 KB
/
InjectUnit.pas
File metadata and controls
200 lines (166 loc) · 6.42 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
unit InjectUnit;
interface
uses windows, sysutils, utils, TlHelp32;
const
CREATE_THREAD_ACCESS = (PROCESS_CREATE_THREAD or
PROCESS_QUERY_INFORMATION or
PROCESS_VM_OPERATION or
PROCESS_VM_WRITE or
PROCESS_VM_READ);
Function InjectByCodeCave(PROCESS_NAME: AnsiString; DLL_NAME: AnsiString): boolean;
Function InjectByCreateRemoteThread(PROCESS_NAME: AnsiString; DLL_NAME: AnsiString): boolean;
Function InjectBySetWindowsHookEx(PROCESS_NAME: AnsiString; DLL_NAME: AnsiString): boolean;
implementation
{==============================================================================}
// Injeta pelo método CreateRemoteThread
{==============================================================================}
Function InjectByCreateRemoteThread(PROCESS_NAME: AnsiString; DLL_NAME: AnsiString): boolean;
{-------------------}
// InjectDLL
{-------------------}
Function InjectDLL(ProcessID: cardinal; dllName: AnsiString): boolean;
var Proc: THandle;
buf: array [0..50] of AnsiChar;
RemoteString, LoadLibAddy: Pointer;
x: cardinal;
begin
if(ProcessID = 0) then
begin
result := false;
exit;
end;
Proc := OpenProcess(CREATE_THREAD_ACCESS, FALSE, ProcessID);
if(Proc = 0) then
begin
result := false;
exit;
end;
LoadLibAddy := GetProcAddress(GetModuleHandle('kernel32.dll'), 'LoadLibraryA');
RemoteString := VirtualAllocEx(Proc, nil, length(DLL_NAME), MEM_RESERVE or MEM_COMMIT, PAGE_READWRITE);
WriteProcessMemory(Proc, RemoteString, pAnsiChar(dllName), length(dllName), x);
CreateRemoteThread(Proc, nil, 0, LoadLibAddy, RemoteString, 0, x);
CloseHandle(Proc);
result := true;
end;
{-------------------}
// LoadDll
{-------------------}
Function LoadDll(procName, dllName: AnsiString ): boolean;
var ProcID: cardinal;
begin
ProcID := 0;
ProcID := GetProcessIdFromProcname(procName);
if(not InjectDLL(ProcID, dllName)) then
MessageBox(0, 'Process located, but injection failed', 'Loader', 0);
result := InjectDLL(ProcID, dllName);
end;
//###############################
begin
result := false;
if(IsWindowsNT) then
result := LoadDll(PROCESS_NAME, DLL_NAME)
else
MessageBox(0, 'É necessário que seu sistema operacional seja Windows NT para executar esta ação!', 'Erro!', 0);
if not result then
MessageBox(0, 'Falha ao injetar','',0) else
MessageBox(0, 'Injetado','',0);
end;
{==============================================================================}
// Injeta pelo método SetWindowsHookEx
{==============================================================================}
Function InjectBySetWindowsHookEx(PROCESS_NAME: AnsiString; DLL_NAME: AnsiString): boolean;
Function LoadDll(procName, dllName: AnsiString) : boolean;
var hDll: HMODULE;
cbtProcAddr: Pointer;
Id: cardinal;
begin
result := false;
if DLL_NAME = '' then
exit;
hDll := LoadLibrary(CMStringToWideChar(dllName));
cbtProcAddr := GetProcAddress(hDll, 'CBTProc');
Id:=GetThreadIdFromProcName(procName);
SetWindowsHookEx(WH_CBT, cbtProcAddr, hDll, id );
result := TRUE;
end;
begin
LoadDll(PROCESS_NAME, DLL_NAME);
end;
{==============================================================================}
// Injeta pelo método CodeCave
{==============================================================================}
Function OpenThread(dwDesiredAccess: dword; bInheritHandle: boolean; dwThreadId: dword): cardinal; stdcall; External 'Kernel32.dll';
Function InjectByCodeCave(PROCESS_NAME: AnsiString; DLL_NAME: AnsiString): boolean;
Procedure loadDll;
begin
asm
// Armazena o endereço de retorno
push $DEADBEEF
// Salva os flags e registradores
pushfd
pushad
// Armazena a string com o nome e o LoadLibrary
push $DEADBEEF
mov eax, $DEADBEEF
// chama o LoadLibrary com os parametros da string
call eax
// Restaura os Registradores
popad
popfd
// Retorna o controle para o thread injetado
ret
end;
end;
Procedure loadDll_end;
begin
end;
var
Stub: Pointer;
dllString: pchar;
wowID, threadID, stubLen, oldIP, oldprot, x: cardinal;
loadLibAddy: cardinal;
hProcess, hThread: THandle;
ctx: CONTEXT;
const
THREAD_GET_CONTEXT = $0008;
THREAD_SET_CONTEXT = $0010;
THREAD_SUSPEND_RESUME = $0002;
THREAD_ALL_ACCESS = $1F03FF;
begin
result := false;
stubLen := cardinal(@loadDll_end) - cardinal(@loadDll);
loadLibAddy := cardinal(GetProcAddress(GetModuleHandle('kernel32.dll'), 'LoadLibraryA'));
wowID := GetProcessIdFromProcname(PROCESS_NAME);
hProcess := OpenProcess((PROCESS_VM_WRITE or PROCESS_VM_OPERATION), false, wowID);
dllString := VirtualAllocEx(hProcess, nil, (length(DLL_NAME) + 1), MEM_COMMIT, PAGE_READWRITE);
stub := VirtualAllocEx(hProcess, nil, stubLen + 1, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
WriteProcessMemory(hProcess, dllString, Pchar(DLL_NAME), length(DLL_NAME), x);
threadID := GetThreadIdFromProcname(PROCESS_NAME);
hThread := OpenThread(THREAD_ALL_ACCESS, false, threadID);
if hThread = 0 then
begin
MessageBox(0, 'Falha ao injetar','',0);
result := false;
exit;
end;
SuspendThread(hThread);
ctx.ContextFlags := CONTEXT_CONTROL;
GetThreadContext(hThread, ctx);
oldIP := ctx.Eip;
ctx.Eip := cardinal(stub);
ctx.ContextFlags := CONTEXT_CONTROL;
VirtualProtect(@loadDll, stubLen, PAGE_EXECUTE_READWRITE, @oldprot);
CopyMemory(Pointer(cardinal(@loadDll) + 1), @oldIP, 4);
CopyMemory(Pointer(cardinal(@loadDll) + 8), @dllString, 4);
CopyMemory(Pointer(cardinal(@loadDll) + 16), @loadLibAddy, 4);
WriteProcessMemory(hProcess, stub, @loadDll, stubLen, x);
SetThreadContext(hThread, ctx);
ResumeThread(hThread);
Sleep(8000);
VirtualFreeEx(hProcess, dllString, length(DLL_NAME), MEM_DECOMMIT);
VirtualFreeEx(hProcess, stub, stubLen, MEM_DECOMMIT);
CloseHandle(hProcess);
CloseHandle(hThread);
result := true;
end;
end.