After the system patch is completed, the online blind irrigation is still connected to www.net.cn. now .... put down his network horse, 8 error, really good. kill 98. nt.2000.xp. xpsp2.2003. I kept it myself and analyzed his Trojan. A traffic Trojan. Server. Now all the ponies are here.Slightly shelled, written in VB.00403DAD. FF15 54104000 call dword ptr ds: [00403DB3. 8985 E0FCFFFF mov dword ptr ss: [EBP-320], EAX00403DB9. EB 0A jmp short Rundll32.00403DC500403DBB> C785 E0FCFFFF> mov dword ptr
will break down the BPX shell_policyicona breakpoint and use F12 to check if the software is called and the parameters are used!
First come to the following:
Here is where the software is called at startup:
* Possible reference to string resource id = 00114: "CCProxy"|: 00408770 6a72 push 00000072: 00408772 51 push ECx: 00408773 c681_f0000000005 mov byte PTR [esp + 000024f4], 05: 0040877b e8c0890100 call 00421140: 00408780 83c408 add ESP, 00000008: 00408783 50 push eax: 00408784 8d4c2414 Lea EC
][-----------------------------------------------------------]The example of shellcode below can effectively deal with NaI Entercept. The method used is to rewrite the function header.[-----------------------------------------------------------]
// This sample code overwrites the preamble of winexec and// Createprocessa to avoid detection. The Code then// Callwinexec with a "calc.exe" parameter.// The Code demonstrates that by overwriting Function// Preambles, it is able to evade Entercept and
Mul: Unsigned Multiplication
; Influence of, CF flag bit; Command Format:; Mul R/m; parameter is the multiplier; if the parameter is R8/M8, the Al will be used as the multiplier and the result will be placed in ax; if the parameter is R16/M16, ax will be used as the multiplier and the result will be placed in eax; if the parameter is R32/M32, eax will be used as the multiplier and the result will be placed in edX: eax
; Test27_1.asm.38
, 0x4; _ cdeclTest eax, eax; if the returned value is nullJnz short msvcr120116fb0c2a1Lea ECx, dword ptr ss: [EBP-0x10]Call bad_alloc; call bad_allocPush msvcr120108fb753d8Lea edX, dword ptr ss: [EBP-0x10]Push edXCall _ cxxthrowexception; call _ cxxthrowexceptionJMP short msvcr120116fb0c266MoV eax, dword ptr ss: [EBP-0x4]; not equal to null, return value to eax, return to Main FunctionMoV ESP, EBPPop EBPRetn
Because vs2013 cannot view its implementati
great superiority of the C ++ language in object-oriented design. Let's take a look at how this virtual works?
76: employee p;0040128D lea ecx,[ebp-10h]00401290 call @ILT+45(employee::employee) (00401032)00401295 mov dword ptr [ebp-4],077: manager m;0040129C lea ecx,[ebp-14h]0040129F call @ILT+65(manager::manager) (00401046)004012A4 mov byte ptr [ebp-4],178: employee* e = p;004012A8 lea eax,[ebp-10h]004012AB
is modified, Kabbah does not report any virus when it is added to other executable files in this way. The modified program ensures the re-running of the program, otherwise, this modification is meaningless. Start the operation. The following eight most common shells are prepared.
I. First test nspack3.6
Load the DT with the nspack shell with OD, and copy the top 10 lines as follows (the blue bold area is the part to be modified, as shown in the following format)004cf302 E8 00000000 call duplica
{2002.8.5 kingron}
{Source: Source string}
{Sub: Sub string}
{Return: Count}
{Ex: strsubcount ('abccdcd', 'bc') = 2}
Function strsubcount (const source, Sub: string): integer;
VaR
Buf: string;
I: integer;
Len: integer;
Begin
Result: = 0;
Buf: = source;
I: = pos (sub, Buf );
Len: = length (sub );
While I Begin
INC (result );
Delete (BUF, 1, I + len-1 );
I: = pos (sub, Buf );
End;
End; {strsubcount}
{The following function returns the position after the specified position of substr in S}{Example:
known to be tuned in the control function and its argument list (stored in aIn the Tvarrec array), how to pass the arguments in when it is called. This requires a few preliminary knowledge:1. First let's take a look at this parameter list: Params. Its type is called variable-open by Delphi.Array of Tvarrec (Variant Open array), which means that the Params is aA member is an array of Tvarrec. In other words, when parameters are passed into the Params, various types areDelphi Automatic conversion
table are in the exception_table_entry structure:
struct exception_table_entry{ unsigned long insn, fixup;};
Insn is the linear address of the instruction to access the process address space. When a page-missing exception is triggered by commands in the insn unit, fixup is the assembly instruction code address to be called. Generally, this assembly code forces the service routine to return an error code to the user-state process.
Insert a table item to the exception table through the Assembl
from left to right. We are still confident that the suffix-specific method and multiplication have a higher operation priority, so we will soon prove ourselves that there is no order in which we can calculate I ++, add up and multiply the three array elements to get 60.
Now I am fascinated by this. My first thought was to check the disassembly code of the code and try to find out what actually happened. I used the debug symbol debugging symbols) to compile this sample code. After using objdump,
] corresponds to the offset of the interrupt number in the Interrupt Descriptor table, the type of the interrupt descriptor is 15, and the privilege level is 3. #define SET_SYSTEM_GATE (N,ADDR) _set_gate (IDT[N],15,3,ADDR)////set the gate description macros function. Parameters: GATE_ADDR-descriptor address; Type-descriptor field value; DPL-descriptor privileged layer value; addr-offset address. %0-(Type label word combined by Dpl,type);%1-(Descriptor low 4-byte address),//%2-(Descriptor high 4-
encryption is very strong, generally can not be cracked. But there's a big problem with the inability to safely generate and keep keys. If each session between the client software and the server uses fixed, the same key encryption and decryption, there must be a great security risk. If someone obtains a symmetric key from the client side, the entire content is not secure, and managing a huge amount of client-side keys is a complex matter.Asymmetric encryption is mainly used for key exchange (al
problems with others, when the idea suddenly jumps out, I have the illusion of freedom ...2. Go left and go rightThere are two selves in each person's body: the sensible me and the rational one.How many fat are the perceptual that I dominate, hard to refuse the temptation of lazy, eventually become fat slaves. How many people have experienced this scene of acquaintance: when we turn on the computer, ready to start to work hard, a message interrupted us. So we go back to the news of friends, and
cracked. But there's a big problem with the inability to safely generate and keep keys. If each session between the client software and the server uses fixed, the same key encryption and decryption, there must be a great security risk. If someone obtains a symmetric key from the client side, the entire content is not secure, and managing a huge amount of client-side keys is a complex matter.Asymmetric encryption is mainly used for key exchange (also called key
Linux PPP and pppoe)
Favorites
Reference: http://www.akadia.com/services/pppoe_iptables.html;
Http://en.wikipedia.org/wiki/point-to-point_protocol_over_ethernet;
Http://blog.csdn.net/absurd/archive/2007/05/04/1596496.aspx
Http://www.36ji.net/article/0859/3550.html
Http://blog.csdn.net/csucxcc/archive/2007/07/10/1684416.aspx
PPP:
PPP consists of two types of Protocols: LCP and NCP ).
LCP is used to establish, remove, and monitor PPP data links. NCP is mainly used to negotiate the format and typ
After openedx is installed, access is very slow. The reason is that fonts.googleapis.com is blocked in China. Therefore, the image is changed to a 360 image, which is expected to be used for a long time. Major changes: 1.cd/edx/app/edxapp/edx-platform/lms/static/sass/basesudo vi _ font_face.scss 2.cd/edx/app/edxapp/edx
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.