From e5c558a13313790d808ce78e5335ab13296601ea Mon Sep 17 00:00:00 2001 From: cocomelonc Date: Mon, 25 Sep 2023 13:43:26 +0300 Subject: [PATCH] malware dev tricks: part 36, add DLL injection link --- _posts/2023-09-25-malware-trick-36.markdown | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/_posts/2023-09-25-malware-trick-36.markdown b/_posts/2023-09-25-malware-trick-36.markdown index a9284c0..e57e053 100644 --- a/_posts/2023-09-25-malware-trick-36.markdown +++ b/_posts/2023-09-25-malware-trick-36.markdown @@ -93,7 +93,7 @@ int listModulesOfProcess(int pid) { As you can see, the code is a bit similar to the PID search logic with `CreateToolHelp32Snapshot`, `Process32First` and `Process32Next`. -So, the full source code is looks like this: +So, the full source code is looks like this (`hack.c`): ```cpp /* @@ -209,7 +209,7 @@ And just run our `hack.exe`: ![hack](/assets/images/108/2023-09-25_12-44.png){:class="img-responsive"} -Also, check with DLL injection logic: +Also, check with [DLL injection](/tutorial/2021/09/20/malware-injection-2.html) logic: ![hack](/assets/images/108/2023-09-25_13-36.png){:class="img-responsive"}