Intercepting Calls to COM Interfaces

Table of Contents

  1. Introduction
  2. Some
    Basic Concepts of COM
  3. Practical
    Example

     
    1. Approach
      #1: Proxy Object

       
    2. Approach
      #2: Vtable Patching
  4. Conclusion
  5. References
  6. History

Introduction  

In this article, I’m going to describe how to implement COM
interface hooks. COM
hooks have something in com
mon with the user-mode API hooks
(both in goals and in methods), but there are also some significant
differences due to the features of COM
technology. I’m going to show two of the most often used approaches to
the problem, emphasizing advantages and disadvantages of each one. The
code sample is simplified as much as possible, so we can concentrate on
the most important parts of the problem.

Some Basic Concepts
of COM

Before we start with intercepting calls to COM
objects, I’d like to mention some
underlying concepts of COM

technology. If you know this stuff well, you can just skip this boring
theory and move straight to the practical part.

All COM
classes implement one
or several interfaces. All the interfaces must be derived from IUnknown
.
It’s used for reference counting and obtaining pointers to other
interfaces implemented by an object. Every interface has a globally
unique interface identifier - IID
. Clients use interface
pointers to call all methods of COM
objects.

This feature makes COM
com
ponents independent on the binary
level. It means if a COM
server is
changed, it doesn’t require its clients to be recom
piled (as long as the new version of
the server provides the same interfaces). It is even possible to replace
COM
server with your own
implementation.

All calls of COM
interface
methods are executed by means of virtual method table (or simply vtable
).
A pointer to vtable
is always the first field of every COM
class. This table is, in brief, an
array of pointers - pointers to the class methods (in order of their
declaration). When the client invokes a method, it makes a call by the
according pointer.

COM
servers work either in the
context of a client process or in the context of some another process.
In the first case, the server is a DLL which is loaded into client
process. In the second case, the server executes as another process
(maybe even on another com
puter).
To com
municate with the server,
the client loads so-called Proxy/Stub DLL. It redirects calls from the
client to the server.

To be easily accessible, a COM

server should be registered in the system registry. There are several
functions, which clients can use to create an instance of COM
, but usually it is CoGetClassObject
,
CoCreateInstanceEx
or (the most com
mon) CoCreateInstance
.

If you want to get more detailed information, you can use MSDN
or one of the sources in the References section.

Practical Example

Let’s see how we can intercept calls to COM
interface. There are several
different approaches to this problem. For instance, we can modify
registry or use CoTreatAsClass
or CoGetInterceptor
functions. In this article, two of the most com
monly used approaches are covered:
use of proxy object and patching of the virtual method table. Each of
them has its own advantages and disadvantages, so what to choose depends
on the task.

A piece of code for this article contains the implementation for the
simplest COM
server DLL, client
application and two samples of COM
hooking that demonstrate the approaches I’m going to describe.

Let’s run the client application without hooks installed. First, we
register the COM
server invoking
the com
mand regsvr32 Com
Sample.dll

. And then we run Com
SampleClient.exe

or SrciptCleint.js
to see how the client of the sample server works. Now it’s time to set
some hooks.

Approach #1: Proxy
Object

COM
is pretty much about binary
encapsulation. Client uses any COM
server via interface and one implementation of the server can be
changed to another without rebuilding the client. This feature can be
used in order to intercept calls to COM
server.

The main idea of this method is to intercept the COM
object creation request and
substitute the newly created instance with our own proxy object. This
proxy object is a COM
object with
the same interface as the original object. The client code interacts
with it as it is the original object. The proxy object usually stores a
pointer to the original object, so it can call original object’s
methods.

As I mentioned, proxy object has to implement all interfaces of the
target object. In our sample, it will be just one interface: ISampleObject
.
The proxy class is implemented with ATL:

Collapse

class
 ATL_NO_VTABLE CSampleObjectProxy :public
 ATL::CCom
ObjectRootEx<
ATL::CCom
MultiThreadModel>
,public
 ATL::CCom
CoClass<
CSampleObjectProxy, &CLSID_SampleObject>
,public
 ATL::IDispatchImpl<
ISampleObject, &IID_ISampleObject,
	&LIBID_Com
SampleLib, 1
, 0
>

{public
:
    CSampleObjectProxy();

DECLARE_NO_REGISTRY()

BEGIN_COM
_MAP(CSampleObjectProxy)COM
_INTERFACE_ENTRY(ISampleObject)COM
_INTERFACE_ENTRY(IDispatch)
    END_COM
_MAP()

DECLARE_PROTECT_FINAL_CONSTRUCT()

public
:
	HRESULT FinalConstruct();void
 FinalRelease();

public
:
    HRESULT static
 CreateInstance(IUnknown* original, REFIID riid, void
 **ppvObject);

public
:
    STDMETHOD(get_ObjectName)(BSTR* pVal);
    STDMETHOD(put_ObjectName)(BSTR newVal);
    STDMETHOD(DoWork)(LONG arg1, LONG arg2, LONG* result);

...

};

STDMETHODIMP CSampleObjectProxy::get_ObjectName(BSTR* pVal)
{return
 m_Name.CopyTo(pVal);
}

STDMETHODIMP CSampleObjectProxy::DoWork(LONG arg1, LONG arg2, LONG* result)
{
    *result = 42
;return
 S_OK;
}

STDMETHODIMP CSampleObjectProxy::put_ObjectName(BSTR newVal)
{return
 m_OriginalObject->
put_ObjectName(newVal);
}

Notice that if there are methods you’re not interested in (for
example, put_ObjectName
), you have to implement them in the
proxy anyway.

Now, we have to intercept creation of the target object to replace it
with our proxy. There are several Windows API functions capable of
creating COM
objects, but usually CoCreateInstance
is used.

To intercept target object creation, I’ve used mhook
library to hook CoCreateInstance
and CoGetClassObject
. The technique of setting API hooks
is a widely covered topic. If you want to get more detailed information
about it you can see, for example, Easy way to
set up global API hooks

article by Sergey Podobry.

Here is the implementation of the CoCreateInstance
hook
function:

Collapse

 HRESULT WINAPI Hook::CoCreateInstance
   (REFCLSID rclsid, LPUNKNOWN pUnkOuter, DWORD dwClsContext, REFIID riid, LPVOID* ppv)
{if
 (rclsid == CLSID_SampleObject)
    {if
 (pUnkOuter)return
 CLASS_E_NOAGGREGATION;

ATL::CCom
Ptr<
IUnknown>
 originalObject;
        HRESULT hr = Original::CoCreateInstance(rclsid, pUnkOuter,
		dwClsContext, riid, (void
**)&originalObject);if
 (FAILED(hr))return
 hr;

return
 CSampleObjectProxy::CreateInstance(originalObject, riid, ppv);
    }

return
 Original::CoCreateInstance(rclsid, pUnkOuter, dwClsContext, riid, ppv);
} 

To see how the sample of proxy object the approach works, specify the
full name of the Com
InterceptProxyObj.dll

in the AppInit_DLLs
registry value (HKEY_LOCAL_MACHINE/Software/Microsoft/Windows
NT/CurrentVersion/Windows

). Now you can run Com
SampleClient.exe

or ScriptClient.js
and see that calls to the target object method are intercepted.

Approach #2: Vtable
Patching

The other way of intercepting calls to a COM
object is to modify the object’s
virtual methods table. It contains pointers to all public
methods
of a COM
object, so they can be
replaced with the pointers to hook functions.

Unlike the previous one, this approach doesn’t require hooks to be
set before the client gets pointer to the target object. They can be set
at any place where a pointer to the object is accessible.

Here is the HookMethod
function code which sets a hook
for a COM
method:

Collapse

HRESULT HookMethod(IUnknown* original, PVOID proxyMethod,
	PVOID* originalMethod, DWORD vtableOffset)
{
    PVOID* originalVtable = *(PVOID**)original;

if
 (originalVtable[vtableOffset] == proxyMethod)return
 S_OK;

*originalMethod = originalVtable[vtableOffset];
    originalVtable[vtableOffset] = proxyMethod;

return
 S_OK;
}

To set hooks for the ISampleObject
interface methods,
the InstallCom
InterfaceHooks

function is used:

Collapse

HRESULT InstallCom
InterfaceHooks(IUnknown* originalInterface)
{//
 Only single instance of a target object is supported in the sample
    if
 (g_Context.get())return
 E_FAIL;

ATL::CCom
Ptr<
ISampleObject>
 so;
    HRESULT hr = originalInterface->
QueryInterface(IID_ISampleObject, (void
**)&so);if
 (FAILED(hr))return
 hr; //
 we need this interface to be present

//
 remove protection from the vtable
    DWORD dwOld = 0
;if
(!::VirtualProtect(*(PVOID**)(originalInterface),sizeof
(LONG_PTR), PAGE_EXECUTE_READWRITE, &dwOld))return
 E_FAIL;

//
 hook interface methods
    g_Context.reset(new
 Context);
    HookMethod(so, (PVOID)Hook::QueryInterface, &g_Context->
m_OriginalQueryInterface, 0
);
    HookMethod(so, (PVOID)Hook::get_ObjectName, &g_Context->
m_OriginalGetObjectName, 7
);
    HookMethod(so, (PVOID)Hook::DoWork, &g_Context->
m_OriginalDoWork, 9
);

return
 S_OK;
}

Virtual method table may be in a write-protected area, so we have to
remove the protection with VirtualProtect
before setting
hooks.

Variable g_Context
is a structure, which contains data
associated with the target object. I’ve made g_Context
global
to simplify the sample though it supports only one target object to
exist at the same time.

Here is the hook functions code:

Collapse

typedef
 HRESULT (WINAPI *QueryInterface_T)
	(IUnknown* This, REFIID riid, void
 **ppvObject);

STDMETHODIMP Hook::QueryInterface(IUnknown* This, REFIID riid, void
 **ppvObject)
{
    QueryInterface_T qi = (QueryInterface_T)g_Context->
m_OriginalQueryInterface;
    HRESULT hr = qi(This, riid, ppvObject);return
 hr;
}

STDMETHODIMP Hook::get_ObjectName(IUnknown* This, BSTR* pVal)
{return
 g_Context->
m_Name.CopyTo(pVal);
}

STDMETHODIMP Hook::DoWork(IUnknown* This, LONG arg1, LONG arg2, LONG* result)
{
    *result = 42
;return
 S_OK;
}

Take a look at the hook functions definitions. Their prototypes are
exactly as the target interface methods prototypes except that they are
free functions (not class methods) and they have one extra parameter - this
pointer. That’s because COM

methods are usually declared as stdcall
, this

is passed as an implicit stack parameter.

When using this approach, you have several things to remember. First
of all, when you set a method hook, it will work not only for the
current instance of the COM

object. It’ll work for all objects of the same class (but not for all
the classes implementing the interface hooked). If there are several
classes implementing the same interface and you want to intercept calls
for all instances of this interface, you will need to patch vtables

of all this classes.

If you want to store some data, which is specific for every object,
you have to store in the static memory area a collection of contexts
accessible by the target object pointer value. You also have to watch
target object’s lifetime. And if you expect multithreaded access for the
target object, you have to provide synchronization for the static
collection.

If you need to call the target object’s method from your hook
function, you have to be careful. You can’t just call a hooked method by
an interface pointer because it will cause an access to vtable
and
a call of the hook function (which is not what you want). So you have
to save the pointer to the original method and use it directly to call
the method.

Here is another tricky thing. When you set a hook, be careful and do
not hook the same method twice. If you save a pointer to the original
method, it will be rewritten on the second hook attempt.

The good news is that in this approach, you don’t have to implement
hooks for the methods you don’t need to intercept. And intercepting
object’s creation is not necessary too.

To see how this part of the sample works, specify the full name of Com
InterceptVtablePatch.dll

in the
AppInit_DLLs
registry value, just like you did before, and
run the client.

Conclusion

Both approaches described in the article have advantages and
disadvantages. The proxy object approach is much easier to implement,
especially if you need sophisticated logic in your proxy. But you have
to replace the target object with your proxy before the client gets the
pointer to the original object, and it may be difficult or simply
impossible in some cases. Also you have to provide in your proxy the
same interface as the target object has, even if you have only a couple
of methods to intercept. And real-world COM
interfaces can be really
large. If the target object has
several interfaces, you’ll probably need to implement them all.

The vtable
patching approach demands much more careful
implementation and requires a developer to remember a lot of things. It
needs some extra amount of code for handling several target object
instances of the same interface or calling the target’s methods. But it
doesn’t require to set hooks directly after target’s creation, the hooks
can be set at any moment. It also allows implementing hooks only for
methods you actually need to intercept.

Which approach is handier at the moment usually depends on the
situation.

时间: 2024-11-02 22:45:21

Intercepting Calls to COM Interfaces的相关文章

C++ 中的 calls / structure 分别指的是什么?

问题描述 C++ 中的 calls / structure 分别指的是什么? 刚写关于这个程序的总结的时候,老师有提到,让我们把 calls 和 structure 一栏里面也 要写好东西. 这两个我该写什么东西进去,能举个例子吗? 比如说: void print (bool x=1) { ********* } 像这个算是structure吗? 那 class umber( double ) { private: ******** public: ******** } 这个class 也可以写

关于执行计划里recursive calls,db block gets和consistent gets参数的解释

执行 我们在实际工作中经常要看某个sql语句的执行计划,例如: 在sqlplus使用命令SET AUTOTRACE ON后,执行计划显示如下: SELECT STATEMENT Optimizer=ALL_ROWS (Cost=985 Card=1 Bytes=26) Statistics----------------------------------------------------------35 recursive calls0 db block gets1052 consisten

如何修改interfaces文件

在一些HP和SUN的机器上,interfaces文件中关于SERVER的信息是以16进制的形式存储的,必须要通过实用 程序dscp才能进行修改. 实际上,我们只要了解了这些16进制数据的格式,也可以直接通过vi来更改interfaces文件. 下面以e3000为例,介绍一下interfaces文件的结构和格式: 用vi打开/opt/sybase/interfaces,可以看到这些信息: E3000 master tli tcp /dev/tcp \x00021a0a9e4d51f80000000

Lua Proper Tail Calls

Lua 函数的一个强大特性之一: 某些tail calls的结果可以穿透上层函数, 直接返回给客户端. 例如 :  function f(x)    return g(x)  end g(x)的结果可以穿透f(x)函数, 直接返回给客户端, 所以在调用g(x)时, 在stack中不需要保存f(x)的信息. 这样做的好处是, 这样的嵌套循环函数即使无限循环, 而不会导致stack溢出. 例如 :  function foo(n)   if n>0 then return foo(n-1) end

Intercepting Filter模式详解

问题描述 在服务器编程中,通常需要处理多种不同的请求,在正式处理请求之前,需要对请求做一些预处理,如: 纪录每个Client的每次访问信息. 对Client进行认证和授权检查(Authentication and Authorization). 检查当前Session是否合法. 检查Client的IP地址是否可信赖或不可信赖(IP地址白名单.黑名单). 请求数据是否先要解压或解码. 是否支持Client请求的类型.Browser版本等. 添加性能监控信息. 添加调试信息. 保证所有异常都被正确捕

解决关闭ORACLE数据库时SHUTDOWN: waiting for active calls to complete.

在关闭ORACLE数据库时,shutdown immediate;命令后一直未关闭,查看ALERT日志,在等待一段时间后日志中有提示: SHUTDOWN: waiting for active calls to complete. 原因是有些进程无法被PMON进程清理,导致SHUTDOWN时无法关闭而HANG住. ==>根据观察,在ORACLE10G及以上版本,会是如下提示:Active call for process 12345 user 'oracle' program 'oracle@a

TypeScript - Interfaces

简介 关注于数据值的 'shape'的类型检查是TypeScript核心设计原则.这种模式有时被称为'鸭子类型'或者'结构子类型化'. . 在TypeScript中接口interfaces的责任就是命名这些类型,而且还是你的代码之间或者是与外部项目代码的契约. 初见Interface 理解interface的最好办法,就是写个hello world程序: 1 2 3 4 5 6 function printLabel(labelledObj: {label: string}) {   conso

Cannot instantiate class: org.jnp.interfaces.NamingContextFactory [Root excepti

问题描述 我测试远程查找时,已经在工程中导入了jbossall-client.jar包,用main函数测试没问题,写到jsp,servlet,action中,还是报这个错:Cannotinstantiateclass:org.jnp.interfaces.NamingContextFactory[Rootexceptionisjava.lang.ClassNotFoundException:org.jnp.interfaces.NamingContextFactory]这是为什么呢? 解决方案

Cannot instantiate class: org.jnp.interfaces.NamingContextFactory

问题描述 错误信息如下:18:04:02,358 ERROR [STDERR] javax.naming.NoInitialContextException: Cannot instantiate class: org.jnp.interfaces.NamingContextFactory [Root exception is java.lang.ClassNotFoundException: org.jnp.interfaces.NamingContextFactory ]18:04:02,3