1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
|
// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
// This file declares a helpers to intercept functions from a DLL.
//
// This set of functions are designed to intercept functions for a
// specific DLL imported from another DLL. This is the case when,
// for example, we want to intercept CertDuplicateCertificateContext
// function (exported from crypt32.dll) called by wininet.dll.
#ifndef BASE_IAT_PATCH_H__
#define BASE_IAT_PATCH_H__
#include <windows.h>
#include "base/basictypes.h"
#include "base/pe_image.h"
namespace iat_patch {
// Helper to intercept a function in an import table of a specific
// module.
//
// Arguments:
// module_handle Module to be intercepted
// imported_from_module Module that exports the symbol
// function_name Name of the API to be intercepted
// new_function Interceptor function
// old_function Receives the original function pointer
// iat_thunk Receives pointer to IAT_THUNK_DATA
// for the API from the import table.
//
// Returns: Returns NO_ERROR on success or Windows error code
// as defined in winerror.h
//
DWORD InterceptImportedFunction(HMODULE module_handle,
const char* imported_from_module,
const char* function_name,
void* new_function,
void** old_function,
IMAGE_THUNK_DATA** iat_thunk);
// Restore intercepted IAT entry with the original function.
//
// Arguments:
// intercept_function Interceptor function
// original_function Receives the original function pointer
//
// Returns: Returns NO_ERROR on success or Windows error code
// as defined in winerror.h
//
DWORD RestoreImportedFunction(void* intercept_function,
void* original_function,
IMAGE_THUNK_DATA* iat_thunk);
// Change the page protection (of code pages) to writable and copy
// the data at the specified location
//
// Arguments:
// old_code Target location to copy
// new_code Source
// length Number of bytes to copy
//
// Returns: Windows error code (winerror.h). NO_ERROR if successful
//
DWORD ModifyCode(void* old_code,
void* new_code,
int length);
// A class that encapsulates IAT patching helpers and restores
// the original function in the destructor.
class IATPatchFunction {
public:
IATPatchFunction();
~IATPatchFunction();
// Intercept a function in an import table of a specific
// module. Save the original function and the import
// table address. These values will be used later
// during Unpatch
//
// Arguments:
// module Module to be intercepted
// imported_from_module Module that exports the 'function_name'
// function_name Name of the API to be intercepted
//
// Returns: Windows error code (winerror.h). NO_ERROR if successful
//
// Note: Patching a function will make the IAT patch take some "ownership" on
// |module|. It will LoadLibrary(module) to keep the DLL alive until a call
// to Unpatch(), which will call FreeLibrary() and allow the module to be
// unloaded. The idea is to help prevent the DLL from going away while a
// patch is still active.
//
DWORD Patch(const wchar_t* module,
const char* imported_from_module,
const char* function_name,
void* new_function);
// Unpatch the IAT entry using internally saved original
// function.
//
// Returns: Windows error code (winerror.h). NO_ERROR if successful
//
DWORD Unpatch();
bool is_patched() const {
return (NULL != intercept_function_);
}
private:
HMODULE module_handle_;
void* intercept_function_;
void* original_function_;
IMAGE_THUNK_DATA* iat_thunk_;
DISALLOW_EVIL_CONSTRUCTORS(IATPatchFunction);
};
} // namespace iat_patch
#endif // BASE_IAT_PATCH_H__
|