Sign in to follow this  
Followers 0
twitchyliquid64

Writing into EOF of currently running EXE.

4 posts in this topic

Hi,

I can write to EOF of unopened files quite easliy.

But I want to make something that can change dynamically.

How can I bypass the file security for a currently running EXE so that the EOF can be written???

EG: Running test.exe causes the date to be written to the EOF of test.exe.

(EOF = End of File)

Is this even possible???

How???


ongoing projects:-firestorm: Largescale P2P Social NetworkCompleted Autoit Programs/Scripts: Variable Pickler | Networked Streaming Audio (in pure autoIT) | firenet p2p web messenger | Proxy Checker | Dynamic Execute() Code Generator | P2P UDF | Graph Theory Proof of Concept - Breadth First search

Share this post


Link to post
Share on other sites



Why write something at EOF and not use the program resources for that?

Because "Imagination".

And it would be pretty cool to do it manually, and then also read the data and do whatever you wan't with it.

I guarantee you this wont be the last question in reference to writing data to EOF.

I've tried doing it myself but ended up with a pile of miserable failure.


Things that I've done..

Icon Resource Editor: icon resource editor 

AutoIt Piano: a piano

AutoIt Unlocker: unlocks files when you want to delete them

Colorful tooltips: a wrapper for the tool tips UDF

Rouge GoogleBot: a full screen animation

ASciTE text editor: a text editor written in autoit

Warning: Posts by this user are subject to change or may disappear without notice.

Share this post


Link to post
Share on other sites

Jos's question was more of philosophical nature, surely.

You can't write to any part of file of running executable. That includes EOF too because of simple fact that running file is in locked state. Also there is absolutely no way of unlocking it, in case someone would be wondering.

Workaround is to run one executable in address space of another. That way file image of the run executable is freed the moment the reading of the image is done, and the locked one is the "victim" process. I call this subrogation and have posted both dll and exe implementations of this unique technique.


♡♡♡

.

eMyvnE

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0