|
Boost : |
Subject: Re: [boost] Fwd: [gsoc18] Boost.Detour & Mentor Search
From: VinÃcius dos Santos Oliveira (vini.ipsmaker_at_[hidden])
Date: 2018-03-22 05:25:00
2018-03-22 1:16 GMT-03:00 Michael Kiros <michaelakiros_at_[hidden]>:
> That repo represents the last, latest state of the repository [...]
>
Thanks.
[...] Like you said, it's easier to work with DLLs because their functions
> are exported so you'd just located the address
> of the function using the export symbol table and the Windows API
> functions/POSIX equivalent.
>
I was more concerned with the separation of library/application when I made
the question.
Suppose I want to change Tibia to cheat the game. There is a main function
there on the executable (it's not _your main_). What's the proper
interception place then? What's the workflow? Open the executable using
your executable and transfer control flow once you prepare the hooks?
The 'hook types' that would be required would be specializations of a
> single type and each type
> would represent a different approach to hooking a function.
>
Thanks.
-- VinÃcius dos Santos Oliveira https://vinipsmaker.github.io/
Boost list run by bdawes at acm.org, gregod at cs.rpi.edu, cpdaniel at pacbell.net, john at johnmaddock.co.uk