Coding it in WinAPI/C++ using Visual Studio - Coding Windows Driver: Mapping Shell-Code & FAKE.DLL
Blog post: https://dennisbabkin.com/blog/?i=AAA10800
0:00 Intro
1:21 Review of DLL_STATS struct members
2:22 Diagram of mapping FAKE.DLL into a process: shell-code and DllMain functions, PreferredAddress when mapping
16:07 Creating CSection::MapSectionForShellCode() function that maps our shell-code
37:05 Writing code to map section for shell-code in NormalRoutine_Proc() callback
42:52 Coding CFunc::debugGetCurrentProcName() to get current process image name
#kernel #driver #tutorial #cpp #win32
Download
0 formats
No download links available.
DLL Injection Into All Processes - Part 14 - Coding Windows Driver: Mapping Shell-Code & FAKE.DLL | NatokHD