Click here to Skip to main content
13,555,266 members
Click here to Skip to main content


138 bookmarked
Posted 9 Oct 2003

DLL Injection and function interception tutorial

, 23 Oct 2003
How to inject a DLL into a running process and then intercept function calls in statically linked DLLs.
i = 0x00401005
ii = 0x0066fd90

	mov eax, 00401005h //i // i==  Pointer to function (DWORD)
	mov ebx, 0066fd90h //ii// ii== Argument (DWORD)
	push ebx //Push Argument
	call eax //Call function
	pop ebx
	int 3h //Breakpoint

B8 05 10 40 00       mov         eax, 00401005h // Pointer to function (DWORD)
BB 90 FD 66 00       mov         ebx, 0066FD90h // Argument to pass (DWORD)
53                   push        ebx
FF D0                call        eax
5B                   pop         ebx
CC                   int         3

By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.

If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it.


This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here


About the Author

Qatar Qatar
Nasser R. Rowhani
Programming simply pumps my adrenaline..

Okay... I like people critisizing me...
Let me fix this article...

You may also be interested in...

Permalink | Advertise | Privacy | Terms of Use | Mobile
Web04 | 2.8.180515.1 | Last Updated 24 Oct 2003
Article Copyright 2003 by CrankHank
Everything else Copyright © CodeProject, 1999-2018
Layout: fixed | fluid