![]() ![]() ![]() My plan was to create my own dll, call it d3d11.dll, and place it in the same directory as Skyrim’s executable. I knew that Skyrim uses DirectX 11 for it’s renderer, which means that it loads d3d11.dll during startup. Whenever a program loads a DLL by name, it looks in a number of pre-set locations for that DLL, and loads the first one it finds. Instead of injecting a dll containing the code to draw a triangle, I decided to abuse Windows’ DLL search order to get Skyrim to load a dll full of my code during startup. I’ve built a few projects that have used process injection to get programs to run code they didn’t intend to, so for this project I decided to try something new. Note: you're looking for modern c++, clean code or best practices, turn back nowĪs usual with things I write about, all the code for this project is up on github, so if you just want to see the code, have at it! DLL Hijacking is the New DLL Injection ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |