Textractor/vnrhook/hijack/texthook.cc

374 lines
9.6 KiB
C++
Raw Normal View History

// texthook.cc
// 8/24/2013 jichi
// Branch: ITH_DLL/texthook.cpp, rev 128
// 8/24/2013 TODO: Clean up this file
#ifdef _MSC_VER
# pragma warning (disable:4100) // C4100: unreference formal parameter
# pragma warning (disable:4018) // C4018: sign/unsigned mismatch
//# pragma warning (disable:4733) // C4733: Inline asm assigning to 'FS:0' : handler not registered as safe handler
#endif // _MSC_VER
2018-08-23 11:53:23 -04:00
#include "hijack/texthook.h"
2018-08-25 15:45:25 -04:00
#include "MinHook.h"
2018-08-23 11:53:23 -04:00
#include "engine/match.h"
#include "except.h"
#include "main.h"
2018-08-25 15:45:25 -04:00
#include "pipe.h"
2018-08-23 11:53:23 -04:00
#include "const.h"
#include "ithsys/ithsys.h"
#include "disasm/disasm.h"
2018-08-23 15:25:33 -04:00
#include "growl.h"
2018-08-25 15:45:25 -04:00
#include <Psapi.h>
2018-08-25 15:45:25 -04:00
TextHook *hookman;
// - Unnamed helpers -
2018-08-07 15:44:13 -04:00
#ifndef _WIN64
namespace { // unnamed
2018-08-25 15:45:25 -04:00
const BYTE common_hook[] = {
0x9c, // pushfd
0x60, // pushad
0x9c, // pushfd
0x8d,0x54,0x24,0x28, // lea edx,[esp+0x28] ; esp value
0x8b,0x32, // mov esi,[edx] ; return address
0xb9, 0,0,0,0, // mov ecx, $ ; pointer to TextHook
0xe8, 0,0,0,0, // call @hook
0x9d, // popfd
0x61, // popad
0x9d, // popfd
0xe9 // jmp @original
};
DWORD Hash(std::wstring module)
{
DWORD hash = 0;
for (auto i : module) hash = _rotr(hash, 7) + i;
return hash;
}
2018-08-25 15:45:25 -04:00
//copy original instruction
//jmp back
DWORD GetModuleBase(DWORD hash)
{
HMODULE allModules[1000];
DWORD size;
EnumProcessModules(GetCurrentProcess(), allModules, sizeof(allModules), &size);
wchar_t name[MAX_PATH];
for (int i = 0; i < size / sizeof(HMODULE); ++i)
{
GetModuleFileNameW(allModules[i], name, MAX_PATH);
_wcslwr(name);
if (Hash(wcsrchr(name, L'\\') + 1) == hash) return (DWORD)allModules[i];
}
return 0;
}
__declspec(naked) // jichi 10/2/2013: No prolog and epilog
int ProcessHook(DWORD dwDataBase, DWORD dwRetn, TextHook *hook) // Use SEH to ensure normal execution even bad hook inserted.
{
// jichi 12/17/2013: The function parameters here are meaning leass. The parameters are in esi and edi
__asm
{
push esi
push edx
call TextHook::Send
retn // jichi 12/13/2013: return near, see: http://stackoverflow.com/questions/1396909/ret-retn-retf-how-to-use-them
}
}
} // unnamed namespace
2018-08-07 15:44:13 -04:00
#endif // _WIN32
// - TextHook methods -
2018-08-25 15:45:25 -04:00
bool TextHook::InsertHook()
2018-08-07 15:44:13 -04:00
{
2018-08-25 15:45:25 -04:00
bool ret = false;
//ConsoleOutput("vnrcli:InsertHook: enter");
WaitForSingleObject(hmMutex, 0);
if (hp.type & DIRECT_READ) ret = InsertReadCode();
2018-08-07 15:44:13 -04:00
#ifndef _WIN64
2018-08-25 15:45:25 -04:00
else ret = InsertHookCode();
2018-08-07 15:44:13 -04:00
#endif
2018-08-25 15:45:25 -04:00
ReleaseMutex(hmMutex);
//ConsoleOutput("vnrcli:InsertHook: leave");
return ret;
2018-08-07 15:44:13 -04:00
}
#ifndef _WIN64
// jichi 12/2/2013: This function mostly return 0.
// It return the hook address only for auxiliary case.
// However, because no known hooks are auxiliary, this function always return 0.
//
// jichi 5/11/2014:
// - dwDataBase: the stack address
// - dwRetn: the return address of the hook
DWORD TextHook::Send(DWORD dwDataBase, DWORD dwRetn)
{
2018-08-25 15:45:25 -04:00
DWORD ret = 0;
ITH_WITH_SEH(ret = UnsafeSend(dwDataBase, dwRetn));
return ret;
}
DWORD TextHook::UnsafeSend(DWORD dwDataBase, DWORD dwRetn)
{
2018-08-25 15:45:25 -04:00
DWORD dwCount,
dwAddr,
dwDataIn,
dwSplit;
BYTE pbData[PIPE_BUFFER_SIZE];
DWORD dwType = hp.type;
dwAddr = hp.address;
/** jichi 12/24/2014
* @param addr function address
* @param frame real address of the function, supposed to be the same as addr
* @param stack address of current stack - 4
* @return If success, which is reverted
*/
if (::trigger)
::trigger = Engine::InsertDynamicHook((LPVOID)dwAddr, *(DWORD *)(dwDataBase - 0x1c), *(DWORD *)(dwDataBase - 0x18));
// jichi 10/24/2014: generic hook function
if (hp.hook_fun && !hp.hook_fun(dwDataBase, &hp))
hp.hook_fun = nullptr;
if (dwType & HOOK_EMPTY) // jichi 10/24/2014: dummy hook only for dynamic hook
return 0;
dwCount = 0;
dwSplit = 0;
dwDataIn = *(DWORD *)(dwDataBase + hp.offset); // default value
if (hp.text_fun) {
hp.text_fun(dwDataBase, &hp, 0, &dwDataIn, &dwSplit, &dwCount);
}
else {
if (dwDataIn == 0)
return 0;
if (dwType & FIXING_SPLIT)
dwSplit = FIXED_SPLIT_VALUE; // fuse all threads, and prevent floating
else if (dwType & USING_SPLIT) {
dwSplit = *(DWORD *)(dwDataBase + hp.split);
if (dwType & SPLIT_INDIRECT) {
if (IthGetMemoryRange((LPVOID)(dwSplit + hp.split_index), 0, 0))
dwSplit = *(DWORD *)(dwSplit + hp.split_index);
else
return 0;
}
}
if (dwType & DATA_INDIRECT) {
if (IthGetMemoryRange((LPVOID)(dwDataIn + hp.index), 0, 0))
dwDataIn = *(DWORD *)(dwDataIn + hp.index);
else
return 0;
}
dwCount = GetLength(dwDataBase, dwDataIn);
}
// jichi 12/25/2013: validate data size
if (dwCount == 0 || dwCount > PIPE_BUFFER_SIZE - sizeof(ThreadParam))
return 0;
if (hp.length_offset == 1) {
dwDataIn &= 0xffff;
if ((dwType & BIG_ENDIAN) && (dwDataIn >> 8))
dwDataIn = _byteswap_ushort(dwDataIn & 0xffff);
if (dwCount == 1)
dwDataIn &= 0xff;
*(WORD *)(pbData + sizeof(ThreadParam)) = dwDataIn & 0xffff;
}
else
::memcpy(pbData + sizeof(ThreadParam), (void *)dwDataIn, dwCount);
// jichi 10/14/2014: Add filter function
if (hp.filter_fun && !hp.filter_fun(pbData + sizeof(ThreadParam), &dwCount, &hp, 0) || dwCount <= 0) {
return 0;
}
if (dwType & (NO_CONTEXT | FIXING_SPLIT))
dwRetn = 0;
2018-08-23 11:53:23 -04:00
*(ThreadParam*)pbData = { GetCurrentProcessId(), dwAddr, dwRetn, dwSplit };
2018-08-25 15:45:25 -04:00
if (dwCount) {
2018-07-13 20:51:09 -04:00
DWORD unused;
2018-08-25 15:45:25 -04:00
//CliLockPipe();
WriteFile(::hookPipe, pbData, dwCount + sizeof(ThreadParam), &unused, nullptr);
//CliUnlockPipe();
}
return 0;
}
2018-08-25 15:45:25 -04:00
bool TextHook::InsertHookCode()
{
2018-08-25 15:45:25 -04:00
bool ret = false;
// jichi 9/17/2013: might raise 0xC0000005 AccessViolationException on win7
__try { ret = UnsafeInsertHookCode(); }
__except (1) {};
return ret;
}
2018-08-04 18:01:59 -04:00
2018-08-25 15:45:25 -04:00
bool TextHook::UnsafeInsertHookCode()
{
2018-08-25 15:45:25 -04:00
if (hp.module && (hp.type & MODULE_OFFSET)) // Map hook offset to real address.
{
if (DWORD base = GetModuleBase(hp.module)) hp.address += base;
else return ConsoleOutput("NextHooker: UnsafeInsertHookCode: FAILED: module not present"), false;
hp.type &= ~MODULE_OFFSET;
}
BYTE* original;
if (MH_CreateHook((void*)hp.address, (void*)trampoline, (void**)&original) != MH_OK) return false;
void* thisPtr = (void*)this;
void* funcPtr = (void*)((BYTE*)ProcessHook - (BYTE*)(trampoline + 19));
DWORD dist = original - (trampoline + sizeof(common_hook)) - 4;
memcpy(trampoline, common_hook, sizeof(common_hook));
memcpy(trampoline + 10, &thisPtr, sizeof(void*));
memcpy(trampoline + 15, &funcPtr, sizeof(void*));
memcpy(trampoline + sizeof(common_hook), &dist, sizeof(dist));
if (MH_EnableHook((void*)hp.address) != MH_OK) return false;
return true;
}
2018-08-07 15:44:13 -04:00
#endif // _WIN32
DWORD WINAPI ReaderThread(LPVOID threadParam)
{
TextHook* hook = (TextHook*)threadParam;
BYTE buffer[PIPE_BUFFER_SIZE] = {};
unsigned int changeCount = 0;
2018-08-23 13:15:24 -04:00
int dataLen = 0;
2018-08-07 15:44:13 -04:00
const char* currentAddress = (char*)hook->hp.address;
while (true)
{
2018-08-21 23:41:19 -04:00
Sleep(500);
2018-08-23 13:15:24 -04:00
if (memcmp(buffer + sizeof(ThreadParam), currentAddress, dataLen + 1) == 0)
2018-08-07 15:44:13 -04:00
{
changeCount = 0;
continue;
}
if (++changeCount > 10)
{
ConsoleOutput("NextHooker: memory constantly changing, useless to read");
ConsoleOutput("NextHooker: remove read code");
break;
}
if (hook->hp.type & USING_UNICODE)
dataLen = wcslen((const wchar_t*)currentAddress) * 2;
else
dataLen = strlen(currentAddress);
2018-08-23 11:53:23 -04:00
*(ThreadParam*)buffer = { GetCurrentProcessId(), hook->hp.address, 0, 0 };
2018-08-23 13:15:24 -04:00
memcpy(buffer + sizeof(ThreadParam), currentAddress, dataLen + 1);
2018-08-07 15:44:13 -04:00
DWORD unused;
2018-08-23 11:53:23 -04:00
WriteFile(::hookPipe, buffer, dataLen + sizeof(ThreadParam), &unused, nullptr);
2018-08-07 15:44:13 -04:00
}
hook->ClearHook();
return 0;
}
2018-08-25 15:45:25 -04:00
bool TextHook::InsertReadCode()
2018-08-07 15:44:13 -04:00
{
2018-08-25 15:45:25 -04:00
RemoveHook(hp.address); // Artikash 8/25/2018: clear existing
2018-08-07 15:44:13 -04:00
if (!IthGetMemoryRange((LPCVOID)hp.address, 0, 0))
{
2018-08-25 15:45:25 -04:00
ConsoleOutput("NextHooker:InsertReadCode failed: cannot access read address");
return false;
2018-08-07 15:44:13 -04:00
}
hp.readerHandle = CreateThread(nullptr, 0, ReaderThread, this, 0, nullptr);
2018-08-25 15:45:25 -04:00
return true;
2018-08-07 15:44:13 -04:00
}
2018-08-25 15:45:25 -04:00
void TextHook::InitHook(const HookParam &h, LPCSTR name, WORD set_flag)
{
2018-08-25 15:45:25 -04:00
WaitForSingleObject(hmMutex, 0);
hp = h;
hp.type |= set_flag;
if (name && name != hook_name) SetHookName(name);
ReleaseMutex(hmMutex);
}
2018-08-25 15:45:25 -04:00
void TextHook::RemoveHookCode()
{
2018-08-25 15:45:25 -04:00
MH_DisableHook((void*)hp.address);
}
2018-08-25 15:45:25 -04:00
void TextHook::RemoveReadCode()
2018-08-04 18:01:59 -04:00
{
TerminateThread(hp.readerHandle, 0);
CloseHandle(hp.readerHandle);
}
2018-08-25 15:45:25 -04:00
void TextHook::ClearHook()
{
2018-08-25 15:45:25 -04:00
WaitForSingleObject(hmMutex, 0);
ConsoleOutput("NextHooker:RemoveHook: enter");
if (hp.type & DIRECT_READ) RemoveReadCode();
else RemoveHookCode();
NotifyHookRemove(hp.address);
if (hook_name) delete[] hook_name;
memset(this, 0, sizeof(TextHook)); // jichi 11/30/2013: This is the original code of ITH
//if (current_available>this)
// current_available = this;
currentHook--;
ConsoleOutput("NextHooker:RemoveHook: leave");
ReleaseMutex(hmMutex);
}
2018-08-25 15:45:25 -04:00
void TextHook::SetHookName(LPCSTR name)
{
2018-08-25 15:45:25 -04:00
name_length = strlen(name) + 1;
if (hook_name) delete[] hook_name;
hook_name = new char[name_length];
strcpy(hook_name, name);
}
int TextHook::GetLength(DWORD base, DWORD in)
{
2018-08-25 15:45:25 -04:00
if (base == 0)
return 0;
int len;
switch (hp.length_offset) {
default: // jichi 12/26/2013: I should not put this default branch to the end
len = *((int *)base + hp.length_offset);
if (len >= 0) {
if (hp.type & USING_UNICODE)
len <<= 1;
break;
}
else if (len != -1)
break;
//len == -1 then continue to case 0.
case 0:
if (hp.type & USING_UNICODE)
len = wcslen((const wchar_t *)in) << 1;
else
len = strlen((const char *)in);
break;
case 1:
if (hp.type & USING_UNICODE)
len = 2;
else {
if (hp.type & BIG_ENDIAN)
in >>= 8;
len = LeadByteTable[in & 0xff]; //Slightly faster than IsDBCSLeadByte
}
break;
}
// jichi 12/25/2013: This function originally return -1 if failed
//return len;
return max(0, len);
}
// EOF