找回密码
 立即注册
调用and钩子线程 | 其它视频/教程 2022-04-09 171 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
本课程共分5章,涵盖5个主题:同步和异步IO、线程池、动态链接库、注入DLL、拦截API。学习之后,你可以完全看不起很多初级Windows程序员,尤其是很多专业工具的使用,比如:dumpbin、debugview、processexplorer等,可以让你的技术素养更上一层楼。

课程从原理出发,结合大量编码示例,讲解以下具体内容:

1、windows中如何处理同步和异步IO,如何通过debugview进行本地和远程调试。

2、线程池调用的四种方法:异步调用;定期通话;内核对象触发调用;异步 IO 触发调用。

3、线程池同步的五种方法:联锁族函数;临界区;事件内核对象;互斥体;信号。

4、线程池资源判断和定制。

5.动态链接库的编写和导出技巧。

6.使用C/C++隐式和显式调用方法。

7、使用C#、VB、Python等语言的调用技巧。

8.dll类库工业设计技巧。

9.注入DLL的四种方法:注册表方法;功能转发;设置钩子方法;远程注入法;

10、DLL的局部钩子、全局钩子、指定线程钩子。

11、综合利用dumpbin、Debugview、ProcessExplorer等工具分析DLL内部调用关系。

12.拦截API原理,导入地址列表(IAT),拦截编码技巧。

13.注入DLL结合拦截API实例,崩溃尖叫! ! !

(This course is divided into five chapters, covering five topics: synchronous and asynchronous IO, thread pool, dynamic link library, injection DLL and interception API. After learning, you can totally despise many junior windows programmers, especially the use of many professional tools, such as dumpbin, DebugView and process explorer, which can improve your technical literacy.Starting from the following examples, we will explain a large number of coding principles:1. How to deal with synchronous and asynchronous IO in windows, and how to debug locally and remotely through DebugView.2. Four methods of thread pool call: asynchronous call; Regular calls; The kernel object triggers the call; Asynchronous IO triggers the call.3. Five methods of thread pool synchronization: interlocking family function; Critical zone; Event kernel object; Mutex; Signal.4. Thread pool resource judgment and customization.5. Compilation and export skills of dynamic link library.6. Use C / C + + to call methods implicitly and explicitly.7. Call skills using c#, VB, Python and other languages.8. DLL class library industrial design skills.9. Four methods of injecting DLL: registry method; Function forwarding; Set hook method; Remote injection method;10. Local hook, global hook and specified thread hook of DLL.11. Make comprehensive use of dumpbin, DebugView, processexplorer and other tools to analyze the internal calling relationship of DLL.12. Intercept API principle, import address list (IAT) and intercept coding skills.13. Inject DLL and intercept API instance to crash!)

[下载]15112848222.rar


151127r04llplpp31qlzla.jpg


上一篇:3个月成为Python爬虫工程师
下一篇:计算机汇编语言编程