flat assembler
Message board for the users of flat assembler.
![]() |
Author |
|
Ali.Z 19 May 2025, 09:39
a DLL wont get injected by its own, you need to manually inject it into target address space.
there several ways, but common ones: - DLL hijacking - shell hooks - manual injection - registry and more can be found even in msdn, you can play with processhacker2 it has good injector and i used a lot. _________________ Asm For Wise Humans |
|||
![]() |
|
z7 19 May 2025, 14:02
Ali.Z wrote: a DLL wont get injected by its own, you need to manually inject it into target address space. Yea i know that DLL won't inject just by compile it, i had some problem while injecting the DLL, which i still don't know But i just copied this line and the problem was gone probably with generating entry point for the dll but honestly i'm not familiar with that Code: if $=$$ dd 0,8 ; if there are no fixups, generate dummy entry end if beside that i literally have low knowledge about instructions, maybe mov,add,sub and some float numbers like xmm0-7 thats all, i would like to get function inside some .dll and modify it the original behavior or add couple of new things to it, popular name as detour, im working on that, probably some old stuff/tools to be back, but for now is just idea because i'm figuring out the detour method, I'm trying now on Windows FASM, then Linux and last MacOS. |
|||
![]() |
|
Jessé 19 May 2025, 20:42
I kind of remember that you should return eax with TRUE on every DLLEntry() callback if successfull; otherwise, system will unload your DLL.
Don't know what MessageBox() returns prior to ret (I suppose 0). |
|||
![]() |
|
< Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2025, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.