Click here to Skip to main content
Click here to Skip to main content
Add your own
alternative version

DLL Injection and function interception tutorial

, 23 Oct 2003
How to inject a DLL into a running process and then intercept function calls in statically linked DLLs.
injecto_src.zip
Injecto_src
src
DLL
DLL.dsw
DLL.dsp
EXE
EXE.dsp
EXE.dsw
OPCODES2.HLP
IntelCodeTable.pdf
adams_asm_tut
STARS.PAS
download.info
PALETTE.DAT
PLASMA.DAT
SINTABLE.DAT
i = 0x00401005
ii = 0x0066fd90

	mov eax, 00401005h //i // i==  Pointer to function (DWORD)
	mov ebx, 0066fd90h //ii// ii== Argument (DWORD)
	push ebx //Push Argument
	call eax //Call function
	pop ebx
	int 3h //Breakpoint


B8 05 10 40 00       mov         eax, 00401005h // Pointer to function (DWORD)
BB 90 FD 66 00       mov         ebx, 0066FD90h // Argument to pass (DWORD)
53                   push        ebx
FF D0                call        eax
5B                   pop         ebx
CC                   int         3
<bytes...>

By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.

If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it.

License

This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here

Share

About the Author

CrankHank

Qatar Qatar
Nasser R. Rowhani
Programming simply pumps my adrenaline..
 
Okay... I like people critisizing me...
Let me fix this article...

| Advertise | Privacy | Terms of Use | Mobile
Web02 | 2.8.141220.1 | Last Updated 24 Oct 2003
Article Copyright 2003 by CrankHank
Everything else Copyright © CodeProject, 1999-2014
Layout: fixed | fluid