Easier Code Injection

Submit Tutorials Related to Memory Hacking Software

Moderators: g3nuin3, SpeedWing, WhiteHat, mezzo

Easier Code Injection

Postby Turtle » Sun Sep 30, 2007 5:02 am

This is one of my old tutorials, it's still useful though.


For easier code injection, read the following as an example, your code will probably be different:

MOV EAX, [EBX+00000304]

To always find what EAX is, just go into the disassembler of L.Spiro's program, and then right-click the pointer line in the code, in this case "MOV EAX,[EBX+00000304]", then click "inject code", and then in this example you would just type the following line of code to be injected:

MOV [9000400], EBX

Where, for example [9000400] is a storage address, an empty address that can be used to store the value of the register. Every process will probably have empty storage addresses available at different locations, they will have to be found.

The only line that you have to write in the code injector is the
MOV [9000400], EBX
The injector automatically finds a code cave, and adds all the required injection-loop-code. When all the code looks ready, you can go ahead and inject it.

Now to find out what EAX is, all you have to do is read the value at 9000400, and then add 304 to it. The value of EBX will always be written to 9000400.


L. Spiro's program: http://www.memoryhacking.com/
Turtle
I Ask A Lot Of Questions
 
Posts: 15
Joined: Tue Jul 18, 2006 12:02 pm

Postby Turtle » Wed Nov 21, 2007 9:20 am

Remember, don't actually use 9000400, I'm just using it here as an example.
Turtle
I Ask A Lot Of Questions
 
Posts: 15
Joined: Tue Jul 18, 2006 12:02 pm


Return to Tutorials

Who is online

Users browsing this forum: No registered users and 0 guests