我想知道,使用windbg或任何其他调试器如何获得父进程创建的子进程的PID。
示例:
调试器附加到任意运行"进程A"。
当调试器附加到进程A(父级)时,进程A使用kernel32!CreateProcess *或kernel32!CreateProcessInternal创建另一个子进程(进程B)。
那么如何从进程A中获取进程B的PID?
主要是我想用pydbg来做,但如果我知道如何使用windbg手动实现这个,我希望我能用pydbg做同样的事情。
先谢谢,
答案 0 :(得分:3)
在WinDbg中,还有命令.childdbg 1
,因此您只需调试所有子进程。
这是在进行用户模式调试时使用断点的较长版本:
0:000> .symfix e:\debug\symbols
0:000> .reload
Reloading current modules
.....
0:000> bp kernel32!CreateProcessW
0:000> g
Breakpoint 0 hit
*** WARNING: Unable to verify checksum for GetChildPID.exe
eax=00467780 ebx=7efde000 ecx=00467804 edx=00000004 esi=003af960 edi=003afa94
eip=755c103d esp=003af934 ebp=003afa94 iopl=0 nv up ei pl zr na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246
kernel32!CreateProcessW:
755c103d 8bff mov edi,edi
0:000> kb
ChildEBP RetAddr Args to Child
003af930 0138148d 00000000 00467804 00000000 kernel32!CreateProcessW
0:000> dp esp
003af934 0138148d 00000000 00467804 00000000 // ReturnAddress AppName CommandLine ProcAttr
003af944 00000000 00000000 00000000 00000000 // ThreadAttr InheritHandles CreationFlags Environment
003af954 00000000 003afa48 003afa30 00000000 // CurrentDir StartupInfo ProcessInfo
0:000> du 00467804
00467804 "notepad.exe"
0:000> dt 003afa30 PROCESS_INFORMATION
GetChildPID!PROCESS_INFORMATION
+0x000 hProcess : (null)
+0x004 hThread : (null)
+0x008 dwProcessId : 0
+0x00c dwThreadId : 0
0:000> ***// Empty before the call
0:000> p;gu
eax=00000001 ebx=7efde000 ecx=755d4964 edx=0000008b esi=003af960 edi=003afa94
eip=0138148d esp=003af960 ebp=003afa94 iopl=0 nv up ei pl zr na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246
GetChildPID!wmain+0xad:
0138148d 3bf4 cmp esi,esp
0:000> dt 003afa30 PROCESS_INFORMATION
GetChildPID!PROCESS_INFORMATION
+0x000 hProcess : 0x00000038 Void
+0x004 hThread : 0x00000034 Void
+0x008 dwProcessId : 0x102c
+0x00c dwThreadId : 0xfb0
102c
是子进程的进程ID。如果该过程没有立即死亡,您可以使用.tlist
进行交叉检查。
如果您没有符号,您仍然可以转储内存
0:000> p;gu
eax=00000001 ebx=7efde000 ecx=755d4964 edx=0000008b esi=003ef910 edi=003efa44
eip=0138148d esp=003ef910 ebp=003efa44 iopl=0 nv up ei pl zr na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246
GetChildPID!wmain+0xad:
0138148d 3bf4 cmp esi,esp
0:000> dp esp-4 L1
003ef90c 003ef9e0
0:000> dp 003ef9e0 L4
003ef9e0 00000038 00000034 00000cc0 00001320
答案 1 :(得分:2)
你可以使用windbg的handle命令搜索带有标志0xf的进程来获取子进程的pid
用 cl / Zi / nologo / W4 / analyze%1%/ link / RELEASE 编译的代码C:\>type codesnips\childdbg\childdbg.cpp
#include <stdio.h>
#include <windows.h>
int main (void)
{
STARTUPINFO si;
PROCESS_INFORMATION pi;
ZeroMemory( &si, sizeof(si) );
si.cb = sizeof(si);
ZeroMemory( &pi, sizeof(pi) );
if( !CreateProcess( "c:\\windows\\system32\\calc.exe",NULL,NULL, NULL, FALSE
,0,NULL,NULL,&si,&pi ) )
{
printf( "CreateProcess failed (%d).\n", GetLastError() );
return 0;
}
printf("waiting and watching when calc.exe will be no more\n");
WaitForSingleObject( pi.hProcess, INFINITE );
printf("calc.exe no more i am free to quit watching\n");
CloseHandle( pi.hProcess );
CloseHandle( pi.hThread );
return 0;
}
C:\> childdbg.exe
waiting and watching when calc.exe will be no more
上面的过程开始运行如下(注意pid或父母和孩子)
tlist -t显示树视图**
C:\>tlist -t | grep -A 1 child
opera.exe (1164) windows - How Internet Explorer(IE11)Creates low Integrity child process without CreateProcess Call - Stack Overflow - Opera
childdbg.exe (6992) C:\codesnips\childdbg\childdbg.exe
calc.exe (7040) Calculator
打开一个windbg或cdb提示符附加到父进程,从父进程中检索所有类型为Process和.detach的句柄(比较通过tlist和cdb获取的pid)
C:&gt; cdb -c“!handle 0 f Process; .detach; q”-pn childdbg.exe
0:001> cdb: Reading initial command '!handle 0 f Process;.detach;q'
Handle 28
Type Process
Attributes 0
GrantedAccess 0x1f0fff:
Delete,ReadControl,WriteDac,WriteOwner,Synch
Terminate,CreateThread,,VMOp,VMRead,VMWrite,DupHandle,CreateProcess,Set
Quota,SetInfo,QueryInfo,SetPort
HandleCount 4
PointerCount 18
Name <none>
Object Specific Information
Process Id 7040
Parent Process 6992
Base Priority 8
1 handles of type Process
Detached
quit:
C:\>