文件名称:OEP
- 所属分类:
- 外挂编程
- 资源属性:
- [Windows] [Visual C] [源码]
- 上传时间:
- 2014-07-01
- 文件大小:
- 169kb
- 下载次数:
- 1次
- 提 供 者:
- mrb***
- 相关连接:
- 无
- 下载说明:
- 别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容均来自于网络,请自行研究使用
OEP感染注入呢,最主要我们要了解OEP的概念。OEP就是程序的入口,比如我们编写一个DLL,那么OEP就相当于DllMain,如果编写一个EXE,那么OEP就相当于main或者WinMain。当windows把一个pe文件装载完成之后,就会直接执行OEP入口,即:AddressOfEntryPoint。我们学过PE知识得知,AddressOfEntryPoint是在IMAGE_OPTIONAL_HEADER32 结构的定义里面。-OEP infection injection, the main we need to understand the concept of the OEP. OEP is the entrance to the program, for example, we write a DLL, so OEP is equivalent to DllMain, if write an EXE, then OEP is equivalent to the main or WinMain. When the Windows a PE file loading is completed, will be directly executed OEP entrance, namely: AddressOfEntryPoint. We learned knowledge, PE AddressOfEntryPoint is inside the IMAGE_OPTIONAL_HEADER32 structure definition.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
KernelInject\drvcommon.h
............\drvversion.h
............\drvversion.rc
............\KernelInject.c
............\KernelInject.h
............\KernelInject.sln
............\KernelInject.suo
............\KernelInject.vcxproj
............\ldasm.c
............\ldasm.h
............\makefile
............\ntifs.h
............\sources
shellcode\shellcode.cpp
.........\shellcode.dsp
.........\shellcode.dsw
.........\StdAfx.cpp
.........\StdAfx.h
OEP感染注入.wps
KernelInject
shellcode