Mik*_*ite 4 c++ memory windows winapi readprocessmemory
我正在尝试扫描第三方应用程序的内存.我已经找到了地址; 现在是0x0643FB78.关键是,我永远不能爬上去,因为LPMODULEENTRY32->modBaseAddr是0x00400000和LPMODULEENTRY32->modBaseSize只是0x006FF000,这样我可以扫描此模块的最大地址0x00AFF000.
这是否意味着我寻求的地址确实存在于另一个进程/模块/线程/东西中?我相信我的过程确实包含了地址.那我该如何访问内存呢?谢谢.
Jer*_*fin 10
至少在我看来,如果你有LPMODULEENTRY参与,你可能会开始走错方向.VirtualQueryEx相反,我会在目标进程中遍历内存块.这将为您提供MEMORY_BASIC_INFORMATION有关该过程中每个块的信息.然后ReadProcessMemory,您可以使用并扫描块来查找您要查找的内容.
这里有一些旧代码我写的大致相同的东西,但寻找字符串而不是指针:
#include <iostream>
#include <vector>
#include <string>
#include <windows.h>
#include <algorithm>
#include <iterator>
template <class InIter1, class InIter2, class OutIter>
void find_all(unsigned char *base, InIter1 buf_start, InIter1 buf_end, InIter2 pat_start, InIter2 pat_end, OutIter res) {
for (InIter1 pos = buf_start;
buf_end!=(pos=std::search(pos, buf_end, pat_start, pat_end));
++pos)
{
*res++ = base+(pos-buf_start);
}
}
template <class outIter>
void find_locs(HANDLE process, std::string const &pattern, outIter output) {
unsigned char *p = NULL;
MEMORY_BASIC_INFORMATION info;
for ( p = NULL;
VirtualQueryEx(process, p, &info, sizeof(info)) == sizeof(info);
p += info.RegionSize )
{
std::vector<char> buffer;
if (info.State == MEM_COMMIT &&
(info.Type == MEM_MAPPED || info.Type == MEM_PRIVATE))
{
SIZE_T bytes_read;
buffer.resize(info.RegionSize);
ReadProcessMemory(process, p, &buffer[0], info.RegionSize, &bytes_read);
buffer.resize(bytes_read);
find_all(p, buffer.begin(), buffer.end(), pattern.begin(), pattern.end(), output);
}
}
}
int main(int argc, char **argv) {
if (argc != 3) {
fprintf(stderr, "Usage: %s <process ID> <pattern>", argv[0]);
return 1;
}
int pid;
sscanf(argv[1], "%i", &pid);
std::string pattern(argv[2]);
HANDLE process = OpenProcess(
PROCESS_VM_READ | PROCESS_QUERY_INFORMATION,
false,
pid);
find_locs(process, pattern,
std::ostream_iterator<void *>(std::cout, "\n"));
return 0;
}
Run Code Online (Sandbox Code Playgroud)
| 归档时间: |
|
| 查看次数: |
4059 次 |
| 最近记录: |