[英]How to find a custom function's address to hook/detour in another running process?
Related to: How to find a functions address to hook/detour in an EXE file? 相关信息: 如何在EXE文件中查找要挂接/绕行的函数地址?
I have to detour a function defined inside the executable I'm injecting my code into. 我必须绕过将代码注入其中的可执行文件中定义的函数。 The application is Open-Source so I know everything about the function I'd need for hooking it.
该应用程序是开源的,因此我了解钩住该功能所需要的一切。
In the accepted answer to that question, it says to hook some low level windows api functions first to get the address of the actual function I want to hook, question is, which windows API function should I hook? 在该问题的公认答案中,它说首先钩住一些底层Windows api函数以获得我想钩住的实际函数的地址,问题是,我应该钩住哪个Windows API函数?
声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.