我需要以编程方式获取DLL的依赖项列表。以下是我尝试解决此任务的方法:
BSTR GetDllDependencies(const wchar_t* dllPath)
{
std::wstring dependencies;
struct LibDeleter
{
typedef HMODULE pointer;
void operator()(HMODULE hMod) { FreeLibrary(hMod); }
};
auto hModRaw = LoadLibraryExW(dllPath, NULL, DONT_RESOLVE_DLL_REFERENCES); //(*)nullptr nere
auto hMod = std::unique_ptr<HMODULE, LibDeleter>();
auto imageBase = (DWORD_PTR)hMod.get();
auto header = ImageNtHeader(hMod.get());
auto importRVA = header->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT].VirtualAddress;
auto importTable = (PIMAGE_IMPORT_DESCRIPTOR)(DWORD_PTR)(importRVA + imageBase);
while (importRVA && importTable->OriginalFirstThunk)
{
auto importedModuleName = (char*)(DWORD_PTR)(importTable->Name + imageBase);
dependencies
.append(importedModuleName, importedModuleName + std::strlen(importedModuleName))
.append(L",");
importTable++;
}
auto result = SysAllocString(dependencies.c_str());
return result;
}
有效。但是,正如您所看到的,它将DLL加载到进程中。我在这个地方遇到了一个问题:LoadLibraryEx
如果进程已经加载了同名的DLL,则返回nullptr
。
我不确定是否允许将两个具有相同名称(但位置不同)的DLL加载到同一进程中?我相信是的。那么为什么LoadLibraryEx
会返回nullptr
?是否有可能在不加载DLL的情况下以某种方式获取DLL依赖?
答案 0 :(得分:1)
你会发现Matt Pietrek的这篇文章很有趣。请特别注意段落&#34; PE文件导入&#34; 中的IMAGE_IMPORT_DESCRIPTOR
数组。
Peering Inside the PE: A Tour of the Win32 Portable Executable File Format
答案 1 :(得分:0)
此解决方案在DLL文件中使用手动导航。解决方案的基础是RVAtoRAW
函数,它将RVA地址转换为RAW地址(文件中的地址)。
//Defining in which section particular RVA address actually located (section number)
DWORD RVAtoRAW(DWORD rva, PIMAGE_SECTION_HEADER sectionHeaderRAW, WORD sectionsCount)
{
int sectionNo;
for (sectionNo = 0; sectionNo < sectionsCount; ++sectionNo)
{
auto sectionBeginRVA = sectionHeaderRAW[sectionNo].VirtualAddress;
auto sectionEndRVA = sectionBeginRVA + sectionHeaderRAW[sectionNo].Misc.VirtualSize;
if (sectionBeginRVA <= rva && rva <= sectionEndRVA)
break;
}
//Evaluating RAW address from section & RVA
auto sectionRAW = sectionHeaderRAW[sectionNo].PointerToRawData;
auto sectionRVA = sectionHeaderRAW[sectionNo].VirtualAddress;
auto raw = sectionRAW + rva - sectionRVA;
return raw;
}
BSTR GetDllDependencies(const wchar_t* dllPath)
{
auto buffer = ReadFile(dllPath);
if (buffer.empty())
return SysAllocString(L"");
//RAW - offset from beginnig of the file (absolute "address" within file)
auto baseRAW = buffer.data();
auto dosHeaderRAW = (PIMAGE_DOS_HEADER)baseRAW;
auto peHeaderRAW = (PIMAGE_NT_HEADERS)(baseRAW + dosHeaderRAW->e_lfanew);
auto sectionHeaderRAW = (PIMAGE_SECTION_HEADER)(baseRAW + dosHeaderRAW->e_lfanew + sizeof(IMAGE_NT_HEADERS));
auto sectionsCount = peHeaderRAW->FileHeader.NumberOfSections;
//RVA - Relative Virtual Address - relative (to ImageBase) address within virtual address space of the process which loads this DLL
auto importTableRVA = peHeaderRAW->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT].VirtualAddress;
auto importTableRAW = RVAtoRAW(importTableRVA, sectionHeaderRAW, sectionsCount);
auto importTable = (PIMAGE_IMPORT_DESCRIPTOR)(baseRAW + importTableRAW);
std::wstring dependencies;
while (importTableRVA && importTable->OriginalFirstThunk)
{
auto nameRAW = RVAtoRAW(importTable->Name, sectionHeaderRAW, sectionsCount);
auto importedModuleName = (char*)(DWORD_PTR)(nameRAW + baseRAW);
dependencies
.append(importedModuleName, importedModuleName + std::strlen(importedModuleName))
.append(L",");
importTable++;
}
auto result = SysAllocString(dependencies.c_str());
return result;
}