码迷,mamicode.com
首页 > Windows程序 > 详细

VadRoot枚举进程模块在Windows7下的完整实现

时间:2017-01-07 14:01:33      阅读:966      评论:0      收藏:0      [点我收藏+]

标签:first   query   get   string   last   枚举   完整   turn   omd   

 

原理小伟的小伟在http://bbs.pediy.com/showthread.php?t=66886说的挺清楚了,Windows7下有一些变化,使用NtQueryVirtualMemory来枚举模块是一个效率很低的事情,自己枚举VadRoot速度是很快的,有N个子节点时,为log(N),还有我在这里补上的基地址获取和镜像大小获取,废话不多说,完整代码如下,仅给有需要的人参考,大侠飘过……

代码:
typedef struct _MMADDRESS_NODE // 0x14
{
    union u1; // +0x0(0x4)
    struct _MMADDRESS_NODE* LeftChild; // +0x4(0x4)
    struct _MMADDRESS_NODE* RightChild; // +0x8(0x4)
    ULONG StartingVpn; // +0xc(0x4)
    ULONG EndingVpn; // +0x10(0x4)
}MMADDRESS_NODE,*PMMADDRESS_NODE;
#pragma pack(push,1)
typedef struct _EX_FAST_REF
{
    union
    {
        PVOID Object;
        ULONG_PTR RefCnt:3;
        ULONG_PTR Value;
    };
} EX_FAST_REF, *PEX_FAST_REF;
#pragma pack(pop)
struct _SEGMENT // 0x38
{
   struct _CONTROL_AREA* ControlArea; // +0x0(0x4)
    ULONG TotalNumberOfPtes; // +0x4(0x4)
    ULONG SegmentFlags; // +0x8(0x4)
    ULONG NumberOfCommittedPages; // +0xc(0x4)
    ULONGLONG SizeOfSegment; // +0x10(0x8)
    union
    {
    struct _MMEXTEND_INFO* ExtendInfo; // +0x18(0x4)
    void* BasedAddress; // +0x18(0x4)
    };
    EX_PUSH_LOCK SegmentLock; // +0x1c(0x4)
    ULONG u1; // +0x20(0x4)
    ULONG u2; // +0x24(0x4)
    struct _MMPTE* PrototypePte; // +0x28(0x4)
    //ULONGLONG ThePtes[0x1]; // +0x30(0x8)
};
struct _CONTROL_AREA // 0x50
{
    struct _SEGMENT* Segment; // +0x0(0x4)
    struct _LIST_ENTRY DereferenceList; // +0x4(0x8)
    ULONG NumberOfSectionReferences; // +0xc(0x4)
    ULONG NumberOfPfnReferences; // +0x10(0x4)
    ULONG NumberOfMappedViews; // +0x14(0x4)
    ULONG NumberOfUserReferences; // +0x18(0x4)
    ULONG  u; // +0x1c(0x4)
    ULONG FlushInProgressCount; // +0x20(0x4)
    struct _EX_FAST_REF FilePointer; // +0x24(0x4)   
};
struct _SUBSECTION // 0x20
{
    struct _CONTROL_AREA* ControlArea; // +0x0(0x4)
    struct _MMPTE* SubsectionBase; // +0x4(0x4)
    struct _SUBSECTION* NextSubsection; // +0x8(0x4)
    ULONG PtesInSubsection; // +0xc(0x4)
    ULONG UnusedPtes; // +0x10(0x4)
    struct _MM_AVL_TABLE* GlobalPerSessionHead; // +0x10(0x4)
    union u; // +0x14(0x4)
    ULONG StartingSector; // +0x18(0x4)
    ULONG NumberOfFullSectors; // +0x1c(0x4)
};
typedef struct _MMVAD // 0x3c
{
    ULONG u1; // +0x0(0x4)
    struct _MMVAD* LeftChild; // +0x4(0x4)
    struct _MMVAD* RightChild; // +0x8(0x4)
    ULONG StartingVpn; // +0xc(0x4)
    ULONG EndingVpn; // +0x10(0x4)
    ULONG u; // +0x14(0x4)
    EX_PUSH_LOCK PushLock; // +0x18(0x4)
    ULONG u5; // +0x1c(0x4)
    ULONG u2; // +0x20(0x4)
    struct _SUBSECTION* Subsection; // +0x24(0x4)
    struct _MSUBSECTION* MappedSubsection; // +0x24(0x4)
    struct _MMPTE* FirstPrototypePte; // +0x28(0x4)
    struct _MMPTE* LastContiguousPte; // +0x2c(0x4)
    struct _LIST_ENTRY ViewLinks; // +0x30(0x8)
    struct _EPROCESS* VadsProcess; // +0x38(0x4)
}MMVAD;

typedef struct   tag_MM_AVL_TABLE // 0x20
{
    struct _MMADDRESS_NODE BalancedRoot; // +0x0(0x14)
    ULONG DepthOfTree; // +0x14(0x4)
    ULONG Unused; // +0x14(0x4)
    ULONG NumberGenericTableElements; // +0x14(0x4)
    void* NodeHint; // +0x18(0x4)
    void* NodeFreeHint; // +0x1c(0x4)
}MM_AVL_TABLE,*PMMAVL_TABLE;


#define GetVadRoot(eprocess)  ((PVOID)((char*)eprocess+0x278))
VOID PrintTree(MMVAD* Root)
{
  POBJECT_NAME_INFORMATION  Str=(POBJECT_NAME_INFORMATION )ExAllocatePool(PagedPool,800);
  ULONG RetLen=0;
  if(!Str||!Root)
    return ;
  RtlZeroMemory(Str,800);//递归要节省堆栈资源,不要大量使用局部变量
  __try
  {
    if(MmIsAddressValid(Root->Subsection)&&MmIsAddressValid(Root->Subsection->ControlArea))
    {
      if(MmIsAddressValid((PVOID)Root->Subsection->ControlArea->FilePointer.Value))
      {
        PFILE_OBJECT pFileObj=(PFILE_OBJECT)((Root->Subsection->ControlArea->FilePointer.Value>>3)<<3);
        if(MmIsAddressValid(pFileObj))
        {
          NTSTATUS Status=ObQueryNameString(pFileObj,Str,800,&RetLen);
          if(NT_SUCCESS(Status))
          {
            KdPrint(("Base:%08X Size:%dKb ",Root->Subsection->ControlArea->Segment->BasedAddress,              (Root->Subsection->ControlArea->Segment->SizeOfSegment)/0x1000));
            KdPrint(("Name:%ws\n",Str->Name.Buffer));
          }
          else
          {
            KdPrint(("不能获取到对象!%08X\n",Status));
          }

        }
      }

    }
  }
  __except(1)
  {
    KdPrint(("Invalid Address!\n"));
  }
  ExFreePool(Str);
  __try
  {
  if(MmIsAddressValid(Root->LeftChild))
    PrintTree(Root->LeftChild);
  if(MmIsAddressValid(Root->RightChild))
    PrintTree(Root->RightChild);
  }
  __except(1)
  {
    KdPrint(("异常!!"));
    return;
  }

}
VOID ShowProcessModule(ULONG Pid)
{
#ifdef DBG
  _asm int 3
#endif 
  PMMAVL_TABLE Table;
  PEPROCESS Epr=0;
  if(NT_SUCCESS(PsLookupProcessByProcessId((HANDLE)Pid,&Epr)))
  {
    KeAttachProcess(Epr);
    Table=(PMMAVL_TABLE)GetVadRoot(Epr);
    if(Table->BalancedRoot.LeftChild)
      PrintTree((MMVAD*)Table->BalancedRoot.LeftChild);
    if(Table->BalancedRoot.RightChild)
      PrintTree((MMVAD*)Table->BalancedRoot.RightChild);
    KeDetachProcess();
  }
}

VOID DriverUnLoad(PDRIVER_OBJECT Driver)
{
  KdPrint(("Driver UnLoaded!\n"));
}

extern "C"
NTSTATUS DriverEntry(PDRIVER_OBJECT pDriverObject,PUNICODE_STRING Reg)
{
  KdPrint(("Enter Driver Entry!\n"));
  pDriverObject->DriverUnload=DriverUnLoad;
  ShowProcessModule(2000);
  KdPrint(("Leave Driver Entry!\n"));
  return STATUS_SUCCESS;
对记事本的测试结果如下:
Base:75740000 Size:25Kb Name:\Device\HarddiskVolume2\Windows\System32\sechost.dll
Base:00060000 Size:48Kb Name:\Device\HarddiskVolume2\Windows\System32\notepad.exe
Base:00000000 Size:102Kb Name:\Device\HarddiskVolume2\Windows\System32\locale.nls
Base:74140000 Size:414Kb Name:\Device\HarddiskVolume2\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16385_none_421189da2b7fabfc\comctl32.dll
Base:00000000 Size:718Kb Name:\Device\HarddiskVolume2\Windows\Globalization\Sorting\SortDefault.nls
Base:00000000 Size:2368Kb Name:\Device\HarddiskVolume2\Windows\Fonts\StaticCache.dat
Base:70FD0000 Size:81Kb Name:\Device\HarddiskVolume2\Windows\System32\winspool.drv
Base:73FC0000 Size:64Kb Name:\Device\HarddiskVolume2\Windows\System32\uxtheme.dll
Base:75420000 Size:172Kb Name:\Device\HarddiskVolume2\Windows\System32\msvcrt.dll
Base:75210000 Size:74Kb Name:\Device\HarddiskVolume2\Windows\System32\KernelBase.dll
Base:745A0000 Size:9Kb Name:\Device\HarddiskVolume2\Windows\System32\version.dll
Base:74FF0000 Size:12Kb Name:\Device\HarddiskVolume2\Windows\System32\cryptbase.dll
Base:753A0000 Size:123Kb Name:\Device\HarddiskVolume2\Windows\System32\comdlg32.dll
Base:75680000 Size:31Kb Name:\Device\HarddiskVolume2\Windows\System32\imm32.dll
Base:75520000 Size:201Kb Name:\Device\HarddiskVolume2\Windows\System32\user32.dll
Base:756A0000 Size:157Kb Name:\Device\HarddiskVolume2\Windows\System32\usp10.dll
Base:76F50000 Size:316Kb Name:\Device\HarddiskVolume2\Windows\System32\ntdll.dll
Base:75BA0000 Size:160Kb Name:\Device\HarddiskVolume2\Windows\System32\advapi32.dll
Base:75A60000 Size:143Kb Name:\Device\HarddiskVolume2\Windows\System32\oleaut32.dll
Base:75900000 Size:348Kb Name:\Device\HarddiskVolume2\Windows\System32\ole32.dll
Base:757D0000 Size:204Kb Name:\Device\HarddiskVolume2\Windows\System32\msctf.dll
Base:75AF0000 Size:161Kb Name:\Device\HarddiskVolume2\Windows\System32\rpcrt4.dll
Base:76D30000 Size:212Kb Name:\Device\HarddiskVolume2\Windows\System32\kernel32.dll
Base:75C40000 Size:3145Kb Name:\Device\HarddiskVolume2\Windows\System32\shell32.dll
Base:77180000 Size:80Kb Name:\Device\HarddiskVolume2\Windows\System32\apisetschema.dll
Base:770B0000 Size:78Kb Name:\Device\HarddiskVolume2\Windows\System32\gdi32.dll
Base:770A0000 Size:10Kb Name:\Device\HarddiskVolume2\Windows\System32\lpk.dll
Base:77120000 Size:87Kb Name:\Device\HarddiskVolume2\Windows\System32\shlwapi.dll

 

jpg改rar技术分享

VadRoot枚举进程模块在Windows7下的完整实现

标签:first   query   get   string   last   枚举   完整   turn   omd   

原文地址:http://www.cnblogs.com/kuangke/p/6259213.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!