This is the fifth part of the DLL Injection series. For your convenience you can find other parts in the table of contents in Part 1 – Registry
In previous posts of this series we saw how to inject DLLs in different ways. Today we are going to write simple DLL to hack Windows XP Minesweeper!
This post is based on Playing with Minesweeper post which described how to hack the game using WinDBG. We are going to do exactly the same, but with DLL injection.
Code
You can find detailed description somewhere else, so today I will just move on to the code:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 |
#include "stdafx.h" #include < cstdio > #include < windows.h > #include < string > BOOL APIENTRY DllMain( HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH:{ char *PEB = NULL; __asm { mov eax, fs:[0x30] mov PEB, eax } char *target = (char*)((*(int*)((int)PEB + 8)) + 0x36FA); char buffer[] = { (char)0xC6, (char)0x00, (char)0x8A }; // eb poi(@$peb + 0x8) + 0x36fa c6 00 8a - shows mines // eb poi(@$peb + 0x8) + 0x36fa c6 00 8e - flags mines SIZE_T written; WriteProcessMemory(GetCurrentProcess(), target, &buffer, 3, &written); break; } case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; } |
We are basically doing exactly the same thing as we would do in WinDBG. Interesting part is how to access Process Environment Block using asm snippet, but it is not something you would do in production.
In order to get it working, you need to inject the DLL at start of application, so you probably would like to use registry injection — remember that injection via registry injects library to all processes! As this is just for demonstration purposes, there is little to no error handling.
However, there is one little surprise in the application, but you need to run it in order to find out what’s going on.