-4

我应该采取什么措施才能到达这个地址:0DE1AC74 知道指针偏移量:194 5C 而这个:“bin.exe”+0121AC10 目标是使用指针而不是每次应用程序重新启动时搜索地址? 在此处输入图像描述

4

2 回答 2

3

在作弊引擎脚本中:

[[bin.exe+0x121AC10]+14c]+194

在装配中:

lea ebx, [bin.exe+0121AC10]
add ebx, 14c
mov ebx, [ebx]
add ebx, 194

在 C++ 中:

您需要获取进程 ID,以便您可以使用 OpenProcess 打开句柄并开始读取内存。您需要通过名称找到模块并使用 ToolHelp32Snapshot 并获取模块快照的 modBaseAddr 成员变量来获取模块基地址。然后,您可以使用 FindDMAAddy 添加和取消引用指针中的每个偏移量。

DWORD GetProcId(const wchar_t* procName)
{
    DWORD procId = 0;
    HANDLE hSnap = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
    if (hSnap != INVALID_HANDLE_VALUE)
    {
        PROCESSENTRY32 procEntry;
        procEntry.dwSize = sizeof(procEntry);

        if (Process32First(hSnap, &procEntry))
        {
            do
            {
                if (!_wcsicmp(procEntry.szExeFile, procName))
                {
                    procId = procEntry.th32ProcessID;
                    break;
                }
            } while (Process32Next(hSnap, &procEntry));

        }
    }
    CloseHandle(hSnap);
    return procId;
}

uintptr_t GetModuleBaseAddress(DWORD procId, const wchar_t* modName)
{
    uintptr_t modBaseAddr = 0;
    HANDLE hSnap = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE | TH32CS_SNAPMODULE32, procId);
    if (hSnap != INVALID_HANDLE_VALUE)
    {
        MODULEENTRY32 modEntry;
        modEntry.dwSize = sizeof(modEntry);
        if (Module32First(hSnap, &modEntry))
        {
            do
            {
                if (!_wcsicmp(modEntry.szModule, modName))
                {
                    modBaseAddr = (uintptr_t)modEntry.modBaseAddr;
                    break;
                }
            } while (Module32Next(hSnap, &modEntry));
        }
    }
    CloseHandle(hSnap);
    return modBaseAddr;
}

uintptr_t FindDMAAddy(HANDLE hProc, uintptr_t ptr, std::vector<unsigned int> offsets)
{
    uintptr_t addr = ptr;
    for (unsigned int i = 0; i < offsets.size(); ++i)
    {
        ReadProcessMemory(hProc, (BYTE*)addr, &addr, sizeof(addr), 0);
        addr += offsets[i];
    }
    return addr;
}
int main()
{
    //Get ProcId of the target process
    DWORD procId = GetProcId(L"bin.exe");

    //Getmodulebaseaddress
    uintptr_t moduleBase = GetModuleBaseAddress(procId, L"bin.exe");

    //Get Handle to Process
    HANDLE hProcess = OpenProcess(PROCESS_ALL_ACCESS, NULL, procId);

    //Resolve base address of the pointer chain
    uintptr_t dynamicPtrBaseAddr = moduleBase + 0x121AC10;

    //Resolve the pointer chain
    std::vector<unsigned int> offsets = { 0x14c, 0x194 };

    uintptr_t addr = FindDMAAddy(hProcess, dynamicPtrBaseAddr, offsets);

    return 0;
}
于 2018-08-27T03:22:53.307 回答
2

从那个img我可以看到你正在使用CE,如果我正确理解你的问题,你需要在CE aa +脚本中做lea ebx,[bin.exe+0121AC10],地址将存储在ebx寄存器中(在64位进程中使用rbx)

于 2018-06-20T11:36:31.357 回答