[Author mailbox]: a474528738@163.com[Software name]: XXX email promotion[Tools]: OD, exeinfoPE[Operating platform]: XP SP3[Author's statement]: I am only interested and have no other purpose. For errors, please enlighten us!--------------------------------------------------------------------------------[Detailed process]The Zp shelling instance information is relatively small in our forum. I saw a ZP shelling software on my computer, so I took it off and wrote it to me.. Mistakes and omissions a
, this problem is not representative. Uncle Bill's staff missed the widechar length, released the variables on the stack as a heap, and added the address content to the user, the only difference is that we don't have to confuse hexadecimal with hexadecimal. However, since the organizer writes it like this, let's take a look. In fact, after reverse partitioning, You can overwrite ret as a template, and then find jmp esp in the code page. Then, it's eas
QQ: 1151639935
Today, when I was studying the process of virus infection with PE executable files, I occasionally found that programs compiled by the VB6.0 compiler have a feature, that is, it can prevent the infection of some viruses (note that it can only prevent the infection of some viruses ). So what exactly is this? See the following analysis:
After learning the principles of virus infection PE files, I tried to manually infect another PE program to verify the accuracy of my knowledge. The
tag: blog OS Ar data 2014 Div art log on /*************************************** * ************ Name: the 4byte platform for the standard redfa remote control receiver is: the sn8p2511 mode is set to 100u *************************** **************************/; register definition sts1 DS 1f_irecok equ sts1. 0; receive a pair of Data t_irsta DS 1t_irnumposi DS 1; High level counter r_irdat1 DS 1; Receive Buffer r_irdat2 DS 1r_irdat3 DS 1r_irdat4 DS limit DS 1; the data received successfully; th
program:
Int iarray [8];
Below are the values of iArray and its elements obtained in C and Assembly expressions:
_ AsmCSizeLENGTH iArraySizeof (iArray)/sizeof (iArray [0])8SIZE iArraySizeof (iArray)32TYPE iArraySizeof (iArray [0])4
8. Notes
The comments in the assembly language can be used in inline assembly, that is, ";". For example:
_ Asm mov eax, OFFSET pbBuff; Load address of pbBuff
The C/C ++ Macro will be moved to a logic line. To avoid confusion caused by the use of assembly langu
Vbprogram anti-virus features and Virus Infection
Author: Fu Bo Lanzhou University of Technology International Trade Major QQ: 1151639935
Today, when I was studying the process of virus infection with PE executable files, I occasionally found that programs compiled by the VB6.0 compiler have a feature, that is, it can prevent the infection of some viruses (note that it can only prevent the infection of some viruses ). So what exactly is this? See the following analysis:
After learning the princi
programmers to directly operate on it.We use the CS register as an example. The same is true for other registers:In realIn mode, when we execute a command to load the CS register (JMP, call, RET, etc.), the relevant values will be loaded into the visible part of the CS register, however, the CPUSee the content in the section to set the invisible part. For example, Run "ljmp x1234, $ go"Then, the visible part of the CS register is 1234 h, and the invi
should execute kernel.This is easy to implement in assembly language. Isn't it okay to use a JMP command?However, you must pay attention to some details when using JMP.
MoV ax, 0x500; jump command to 0x500: 0000, and change es and DS to 0x500, but note that CS cannot be changed before JMP commandMoV es, axMoV ds, axJMP 0x0500: 0x0000
The red above is the code fo
Introduction:
API Interception is not a new technology. Many commercial software use this technology. There are two methods to intercept Windows API functions. The first one is Mr. jeffrey Richter's module input section for modifying the EXE file. This method is safe, but complicated. In addition, some EXE files do not have a list of DLL input symbols, blocking may fail. The second method is the commonly used jmp xxx method. Although it is very old,
principle of word extraction.First, let me explain the hook problem. The hook is indeed used in the word overlord, and he uses two types of hooks, one of which is the Windows Standard hook. He uses setjavaswhook to install a callback function, which installs a mouse hook, it is used to respond to the mouse message in a timely manner and does not have much to do with word retrieval.Another type of Hook is API hook, which is the core technology of word retrieval. He wrote a
determined that the content of the hidden part is consistent with the content of the segment descriptor (see the format of the segment description ), however, the format may be different. But the format is not important for us to understand this, because it is impossible for programmers to directly operate on it.
We use the CS register as an example. The same is true for other registers:
In real mode, when we execute a command to load the CS register (JMP
function.2. About the jump statement in the assembler, why use jump, about the return value of the study (1), the return value of one, jump directly to the next instruction? (2), how is the return value handled when it is multiple?We write the following procedure:We see how it is implemented in debug as follows:As we can see, when the F function returns, after the function return (after putting the return value in Ax), the next sentence is jmp 020f.
In Pmtest4, we have seen how to transfer from a low privilege level to a highly privileged level for non-conformance code. But how do we move from a high-privileged level to a low-privileged level? At first we were in real mode, the ring 0, how we went from ring 0 to Ring3, which is not possible through call and jmp, and how we should do it. This article is mainly for you to answer these questions, showing the way to achieve this level of privilege tr
his careful guidance on this cainiao!By the way, shelling requires special interest and patience. If you don't have patience, you will ......;)After a bunch of nonsense, let's go to the topic below :)In combination with the new KG of the doll Wom, it is generally a simple analysis method for a shell.1. Find OEPThe general process of shelling is: Shell check-> Search for OEP-> Dump-> repairThere is nothing to say about shell check. FI and PEiD, unfortunately neither FI nor PEiD can recognize thi
not know where to go. Therefore, an exit () system call must be executed to end the execution of shellcode. c.Let's take a look at the compilation code of exit (0:(Gdb) disassemble _ exit Dump of your er code for function _ exit: 0x800034c
2. Implement a shellcode
Okay. Let's implement this algorithm. First, we must have a string "/bin/sh" and a name.Array. We can construct them, but how do we know their addresses in shellcode? Each timeThe program is dynamically loaded, and the address of the
Class C compiler C code implementation, c compiler code implementation
This is a small project last semester.
Class C Compiler
Source code and test file address https://github.com/zxt1995/ttbox.git
Overall framework: Read the file to be compiled-> Semantic Analysis and convert to command-> perform stack operations according to command-> get the result
Extended Part (I am responsible for commenting on other content in the Code)
Finished content
Do while LOOP
Switch case statement
Goto statement
his careful guidance on this cainiao!By the way, shelling requires special interest and patience. If you don't have patience, you will ......;)After a bunch of nonsense, let's go to the topic below :)In combination with the new KG of the doll Wom, it is generally a simple analysis method for a shell.1. Find OEPThe general process of shelling is: Shell check-> Search for OEP-> Dump-> repairThere is nothing to say about shell check. FI and PEiD, unfortunately neither FI nor PEiD can recognize thi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.