搜索资源列表
Api Hook和封包拦截技术
- const WM_UNSUBCLASS = WM_USER + 2001 //卸载子类化消息 WM_SENDDATA = WM_USER + 2003 //收到要发送新数据包的消息 type PMyDLLVar = ^TMyDLLVar //用来共享的内存数据结构 TMyDLLVar = record SubClass: Boolean //是否已经子类化 HookWindow, SpyWindow: LongWORD //要安装HOOK的窗口及用于接收消息的窗口 hHook: LongWORD
wsock32
- 通过api拦截socket数据包,创建一个动态链接库来代替原winsock接口库,可放入外挂控制代码-Instead api intercept a the socket packet, to create a dynamic link library the original winsock interface library, into the plug-in control code
apihook
- C#.NET 2008下开发的API HOOK进程send函数,可封装成DLL,对发送的数据包进行拦截,修改-C#. NET 2008 development of the API HOOK process under the send function, can be packaged into a DLL, for sending data packets to intercept, modify,
WSPHOOK
- 利用WSPHOOK拦截封包数据 钩子注入D-Use WSPHOOK intercept data packets Hook DLL injection
APIHOOK
- 利用APIHOOK拦截封包数据 钩子注入D-Use APIHOOK hook into DLL to intercept data packets
HookDll
- // NtDeviceIoControlFile的HOOK函数 // ws2_32.dll的send , recv最终会调用到mswsock.dll内的数据发送函数 // mswsock.dll会调用NtDeviceIoControlFile向TDI Client驱动发送Send Recv指令 // 我们在这里做拦截,可以过滤所有的TCP 收发包(UDP之类亦可,不过要更改指令) // Hook mswsock.dll导出表的Ntdll!NtDeviceIoControlFile