## Where communities thrive

• Join over 1.5M+ people
• Join over 100K+ communities
• Free without limits
##### Activity
• 05:07
wangruoyi1996 commented #368
• Apr 12 04:39
wangruoyi1996 opened #368
• Apr 12 02:53
t-anh opened #367
• Apr 11 06:47
spazzarama commented #365
• Apr 11 06:22
spazzarama closed #363
• Apr 06 19:58
ORCA666 commented #363
• Mar 26 12:01
QGB commented #295
• Mar 26 12:00
QGB commented #295
• Mar 26 08:23
QGB commented #275
• Mar 26 08:20
QGB commented #275
• Mar 26 08:08
QGB commented #16
• Mar 26 08:06
QGB commented #16
• Mar 26 07:14
QGB commented #69
• Mar 25 12:39
enzeinzen opened #366
• Mar 21 15:35
jackwolail opened #365
• Mar 08 19:40
michaelgorman commented #363
• Mar 07 06:15
TENX-S commented #363
• Mar 04 04:09
SiyerBOBO commented #364
• Mar 04 04:06
SiyerBOBO commented #364
• Mar 04 03:57
SiyerBOBO commented #364
Justin Stenning
@spazzarama
The remote thread probably is failing to be created...
The ASM that is injected is returned by GetInjectionPtr() - returning either Injection_ASM_x64, or Injection_ASM_x86
@TinkerWorX take a look at this ASM code in HookSpecific_x64/x86.asm, if it is getting as far as running this code then one of the calls in here is probably failing (in the target process - so you will have to have the disassembler window open, and pointing to the correct address from RemoteInjectCode with a break point) .
Nikolaj Mariager
@TinkerWorX
@spazzarama Thanks, I'll see if I can figure it out. Do you think my suspicion of some protection happening could be true?
Justin Stenning
@spazzarama
@TinkerWorX yeah it could be - usually protection will take the form of either allocating memory in the target failing, or LoadLibrary within the ASM code failing.
suncodeer
@suncodeer
Hi everyone , I am a fresher guy on the easyhook
suncodeer
@suncodeer
anybody online?
suncodeer
@suncodeer
anybody online?
Justin Stenning
@spazzarama
Welcome @suncodeer
Just ask questions here if you need to. End of day for me so goodnight
suncodeer
@suncodeer
anybody online?
suncodeer
@suncodeer
suncodeer
@suncodeer
anybody online？
suncodeer
@suncodeer
^_^~~
suncodeer
@suncodeer
@spazzarama I want to use olydb64 to analyze the problem. But hooked method will be canceled. Actually I was a web developer.
I am very fresher guy in the C# area.
You should be busy on some your own problems.
Can you please tell me how to anlayze the problem ? like debug or other tricky methods.
suncodeer
@suncodeer
@spazzarama have a nice day
suncodeer
@suncodeer
-_-~~~ Anybody online ?
suncodeer
@suncodeer
Jerome Haltom
@wasabii
When using EasyHook I consistently get the maanged debugging assistant. Is this normal?
MechanicalPen
@MechanicalPen
@suncodeer If you are hooking into a c++ method of an object, the first memory location is a pointer to the object.
not sure if that is your actual problem but it's what I had to do to get mine working. It looks like:
    [UnmanagedFunctionPointer(CallingConvention.ThisCall, SetLastError = true, CharSet = CharSet.Unicode)]
[return: MarshalAs(UnmanagedType.Bool)]
delegate bool SmflAudio2_SoundBuffer_loadFromFile(IntPtr self, IntPtr filename);

on the c++ side the code looks like;

sf::SoundBuffer buffer; buffer.loadFromFile("sound.wav");

99bobster99
@99bobster99
Hello
How does one convert a project which uses Easyhook (v2.7.6684) to (v2.7.6789)?
Justin Stenning
@spazzarama
6789 is a bug fix release, just update the package from Nuget.
@99bobster99
99bobster99
@99bobster99
Many thanks Justin, I'll try it! Cheers!
99bobster99
@99bobster99
I get his error message, that it is not digitally signed?
\packages\EasyHook.2.7.6789\tools\install.ps1 is not digitally signed. The script will not execute on the system. For more information, see about_Execution_Policies at
At line:1 char:3
• & 'D:\test100\Source (Zhook 2.7.6684 - WinFS v180906)\Win-FS-Reg-Redirect\packag ...
• ~~~~~~~~~~~~~~~~
• CategoryInfo : SecurityError: (:) [], PSSecurityException
• FullyQualifiedErrorId : UnauthorizedAccess
99bobster99
@99bobster99
I was still able to build, but with this newer Easyhook library I now get this error (never got this error on the older 6684 version), would it be because of the lack of digital signature?
There was an error while injecting into target:
System.ApplicationException: STATUS_INTERNAL_ERROR: Unknown error in injected C++ completion routine. (Code: 15)
at EasyHook.RemoteHooking.CreateAndInject(String InEXEPath, String InCommandLine, Int32 InProcessCreationFlags, InjectionOptions InOptions, String InLibraryPath_x86, String InLibraryPath_x64, Int32& OutProcessId, Object[] InPassThruArgs)
at test1.Program.Main(String[] args) in D:\projects\test1\Program.cs:line 57
99bobster99
@99bobster99
This is line 57, which hasn't changed from v2.7.6684, which use to work??
                    // start and inject into a new process
EasyHook.RemoteHooking.CreateAndInject(
targetExe, // executable to run
targetArg, // command line arguments for target
0, // additional process creation flags to pass to CreateProcess
EasyHook.InjectionOptions.DoNotRequireStrongName, // allow injectionLibrary to be unsigned
injectionRegLibrary, // 32-bit library to inject (if target is 32-bit)
injectionRegLibrary, // 64-bit library to inject (if target is 64-bit)
out targetPID, // retrieve the newly created process ID
regChannelName // the parameters to pass into injected library
// ...
);
99bobster99
@99bobster99
Never mind, I got it to work out for me! I am a newbie at this and I just learned a great deal about "Set-ExecutionPolicy Unrestricted -Scope Process -Force" and "Update-Package -Reinstall"! Thank you for helping me out on my adventure. :)
Patricio Ferraggi
@Raagh
Is There a way to change the place where you drop the libraries? unless I have them all the in root of my client application
it justs fails on injection
even if I pass the address as a parameter
rgutherz
@rgutherz

Hi,

I'm using the latest EasyHook dll (32 and 64 v2.7.6789.0 ) and I'm hooking WriteConsoleW API successfully on Windows 7. I'm using the same 64 bit dll on Windows 10 and my dll is injected successfully but my hooked function is never called when running on Windows 10.
The LhInstallHook returned successfully when hooked WriteConsoleW from kernel32.dll
The process that I'm trying to hook is cmd.exe on Windows 10.
I debugged the process after my dll was injected and saw that the WindowsConsoleW entry does not contain the trampoline code to point to my WriteConsoleW function.

What can be the problem?
How can I debug it?

Any input on this would be appreciated!

Thanks,
Rony.

I'm using unmanaged code in c++
tostercx
@tostercx
Hey, I just read the tutorials, but I'm a bit confused. The ServerInterface stuff is compiled in the injectable dll but then it seems to be running in the host for the message output? Am I getting this right?
How would I go about getting the data back to the main process that did the injection?
I guess I could make a static list and poll it for data or?
tostercx
@tostercx
I must be missing something here...
tostercx
@tostercx
tostercx
@tostercx
Wait.. so the interface can be made host-side?
https://github.com/EasyHook/EasyHook/blob/master/Examples/FileMon/Program.cs#L11
And then... the dll depends on the exe for it? O___O
What sorcery is this...
Ok, I think I found what I wanted
Justin Stenning
@spazzarama
The dll that is injected is connecting to the IPC channel that is created in the host. The example filemon is more confusing as it doesn’t have the interface separated into another assembly and then the injected code is referencing the exe as if it is an assembly (which in .net it is but still confusing :)
@tostercx above
direct3dhook project on GitHub provides a clearer example if you want to check another one - also it uses a bi-directional IPC setup
tostercx
@tostercx
Thanks, will do :)