CreateRemoteThread MessageBoxA导致远程进程崩溃

CreateRemoteThread MessageBoxA causes remote process to crash

我做了一个简单的程序,计算user32.dll中函数MessaegBoxA的RVA,然后将该偏移量与远程进程内存中dll的加载基地址相加得到地址函数 MessageBoxA。我制作了一个 虚拟程序 ,它使用 GetProcAddress 在其内存中输出函数的地址,然后在我的程序中实现我自己的函数以显示它为同一函数计算的地址在远程进程中。它们总是匹配,所以我确定我在远程进程中查找 MessageBoxA 地址的函数不是问题。

我制作了一个 struct,其中包含 ThreadProc 在我使用 WriteProcessMemory 加载它后在远程进程中执行 MessageBoxA 所需的所有必要信息和参数。

typedef struct
{
    typedef int (WINAPI* _MessageBoxA)(HWND, LPCSTR, LPCSTR, UINT);
    _MessageBoxA MessageBoxA;
    //These are the four parameters passed to MessageBoxA
    HWND hwnd;
    LPCSTR msg;
    LPCSTR caption;
    UINT mb;
}MB_DATA, *PMB_DATA;

当我在我自己的 虚拟程序 上尝试这个时,消息框出现了但是奇怪的文本与我在 msg 和 [= 中指定的字符串相反23=] MB_DATA 的成员。它为标题 asic_string::erase 和消息 u) 表示以下内容。当我尝试在 虚拟进程 之外的任何其他进程中执行此操作时,它会使远程进程崩溃。我创建了一个函数来遍历进程中已加载的模块,其中包含 tlhelp32 函数,以确保 user32.dll 存在并且它存在,而我用于查找进程中函数地址的函数没有't return NULL 就像没有 dll 时那样。

这里是所有相关函数和我的 main 函数:

dependencies.hpp

#include <windows.h>
#include <tlhelp32.h>
#include <stdio.h>
#include <iostream>
using namespace std;

typedef struct
{
    typedef int (WINAPI* _MessageBoxA)(HWND, LPCSTR, LPCSTR, UINT);
    _MessageBoxA MessageBoxA;
    HWND hwnd;
    LPCSTR msg;
    LPCSTR caption;
    UINT mb;
}MB_DATA, *PMB_DATA;

//Map the dll into memory
void* GetFileImage(char path[])
{
    HANDLE hFile = CreateFile(path, GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_READONLY, NULL);
    if(hFile == INVALID_HANDLE_VALUE){printf("Error getting file handle: %d", (int)GetLastError());return NULL;}

    HANDLE file_map = CreateFileMapping(hFile, NULL, PAGE_READONLY|SEC_IMAGE, 0, 0, "KernelMap");
    if(file_map == INVALID_HANDLE_VALUE){printf("Error mapping file: %d", (int)GetLastError());return NULL;}

    LPVOID file_image = MapViewOfFile(file_map, FILE_MAP_READ, 0, 0, 0);
    if(file_image == 0){printf("Error getting mapped view: %d", (int)GetLastError());return NULL;}

    return file_image;
}

//Get to the function export directory and find the offset for the specified function from the 
//address in memory the dll was loaded at
DWORD_PTR RVAddress(char* image, const char* proc_name)
{
    PIMAGE_DOS_HEADER pDos_hdr = (PIMAGE_DOS_HEADER)image;
    PIMAGE_NT_HEADERS pNt_hdr = (PIMAGE_NT_HEADERS)(image+pDos_hdr->e_lfanew);
    IMAGE_OPTIONAL_HEADER opt_hdr = pNt_hdr->OptionalHeader;
    IMAGE_DATA_DIRECTORY exp_entry = opt_hdr.DataDirectory[IMAGE_DIRECTORY_ENTRY_EXPORT];
    PIMAGE_EXPORT_DIRECTORY pExp_dir = (PIMAGE_EXPORT_DIRECTORY)(image+exp_entry.VirtualAddress);

    DWORD* func_table = (DWORD*)(image+pExp_dir->AddressOfFunctions);
    WORD* ord_table = (WORD*)(image+pExp_dir->AddressOfNameOrdinals);
    DWORD* name_table = (DWORD*)(image+pExp_dir->AddressOfNames);

    for(u_int i=0;i<pExp_dir->NumberOfNames;i++)
    {
        char* name = (char*)(image+name_table[i]);
        if(strcmp(proc_name, name) == 0)
        {
            return (DWORD_PTR)func_table[ord_table[i]];
        }
    }

    return (DWORD_PTR)0;
}

//Add the RVA returned from RVAddress to the address of the dll to find the function in the
//process memory
LPVOID GetProcAddressEx(DWORD dwPid, char* mod_path, char* function_name, char* mod_name)
{
    HANDLE hSnapshot = INVALID_HANDLE_VALUE;
    MODULEENTRY32 me32;
    me32.dwSize = sizeof(MODULEENTRY32);

    hSnapshot = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE|TH32CS_SNAPMODULE32, dwPid);
    if(hSnapshot == INVALID_HANDLE_VALUE){printf("Snapshot failed");return 0;}

    if(!(Module32First(hSnapshot, &me32)))
    {
        printf("Mod32First failed");
        return 0;
    }

    BOOL found = FALSE;

    while(Module32Next(hSnapshot, &me32))
    {
        if(stricmp(me32.szModule, mod_name) == 0)
        {
            CloseHandle(hSnapshot);
            found = TRUE;
            break;
        }
    }

    if(found == FALSE){return 0;}

    DWORD_PTR RVA = (DWORD_PTR)RVAddress((char*)GetFileImage(mod_path), function_name);

    LPVOID func_addr = me32.modBaseAddr+RVA;
    return func_addr;
}

main.cpp

#include "dependencies.hpp"
#define FUNC_SIZE 1024

typedef int (WINAPI* _MessageBoxA)(HWND, LPCSTR, LPCSTR, UINT);

int main()
{
    MB_DATA mb_data;
    mb_data.hwnd = NULL;
    mb_data.msg = "Hey";
    mb_data.caption = "Yo";
    mb_data.mb = MB_OK;

    SIZE_T nBytes = 0;

    char proc_path[MAX_PATH];
    char kernel_path[MAX_PATH];
    char user32_path[MAX_PATH];

    //get full path to the current process and store it in proc_path
    GetModuleFileName(GetModuleHandle(NULL), proc_path, MAX_PATH);
    //get full path to kernel32.dll and store it in kernel_path
    GetModuleFileName(GetModuleHandle("kernel32.dll"), kernel_path, MAX_PATH);
    //get full path to user3.dll and store it in user32_path
    GetModuleFileName(GetModuleHandle("user32.dll"), user32_path, MAX_PATH);

    //show all processes running and their PID's
    system("tasklist");

    DWORD dwPid = 0;
    printf("PID: ");
    scanf("%lu", &dwPid);
    //if dwPid is 0 assign it the pid of the current process
    if(dwPid == 0)
    {
        dwPid = GetCurrentProcessId();
    }

    //Get a handle to the process with all access rights
    HANDLE hProc = OpenProcess(PROCESS_ALL_ACCESS, FALSE, dwPid);
    //make sure the handle is valid
    if(hProc == NULL){printf("Error obtaining handle to process: %lu", GetLastError());return 1;}

    //Get the address of the function in the remote process
    LPVOID _MessageBoxA1 = GetProcAddressEx(dwPid, user32_path, (char*)"MessageBoxA", (char*)"user32.dll");
    //assign the pointer to the address to the member MessageBoxA of the MB_DATA structure
    mb_data.MessageBoxA = (_MessageBoxA)_MessageBoxA1;

    //allocate 2mb for our the ThreadProc callback function and the MB_DATA structure
    LPVOID lpBase = VirtualAllocEx(hProc, NULL, 2048, MEM_RESERVE|MEM_COMMIT, PAGE_EXECUTE_READWRITE);
    //did the allocation work
    if(lpBase == NULL){printf("Error allocating space: %lu", GetLastError());return 1;}

    //so I can check what was written with CheatEngine
    cout << "Base address of memory allocated in remote process: " << lpBase << endl;

    //Write the function into memory
    if(WriteProcessMemory(hProc, lpBase, (LPVOID)ThreadProc, FUNC_SIZE, &nBytes) == 0)
    {
        printf("Error writing function to process");
        return 1;
    }

    //the address the space left after having written ThreadProc into memory 
    LPVOID lpBuffer = lpBase+FUNC_SIZE;

    //Write the MB_DATA structure into the memory of the remote process
    if(WriteProcessMemory(hProc, lpBuffer, &mb_data, sizeof(MB_DATA), &nBytes) == 0)
    {
        printf("Error writing buffer to process");
    }

    //Run the ThreadProc function passing the MB_DATA structure to it as its lpParam parameter
    if(CreateRemoteThread(hProc, NULL, 0, (LPTHREAD_START_ROUTINE)lpBase, lpBuffer, 0, NULL) == NULL)
    {
        printf("Error creating remote thread: %lu", GetLastError());
        return 1;
    }

    //print a list of all the dll's being used by the process
    EnumerateModules(dwPid);

    system("pause");

    return 0;
}

如有任何帮助,我们将不胜感激。非常感谢你! :)

mb_data.msg 和 mb_data.caption 指向另一个进程中的什么?这已经足够崩溃错误了。 ThreadProc 中的内容不可见,但我不确定它是否没有重定位。实际上 ThreadProc 必须是 MB_DATA 的成员函数并且只能访问它的成员。从你那里 post 显然你没有在注入时调试远程进程。也显然该任务超出了您当前的水平