{ 0x1093a10 ebfe JMP main.deadloop(SB) 0x1093a12 cc INT $0x3 0x1093a13 cc INT $0x3 0x1093a14 cc INT $0x3 0x1093a15 cc INT $0x3 ... ... 0x1093a1f cc INT $0x3
We see that the call to add in Deadloop also disappears. This is obviously the result of Go c
::onbnclickedsub () {ASSERT (hinst); mysub = (m_sub):: GetProcAddress (hinst, "sub"); int a = n, b = 6;int Res = MySub (A, b); CString Str;str. Format (_t ("a-b=%d"), res); AfxMessageBox (str);} void Cmathtestdlg::onbnclickedmod () {ASSERT (hinst); mymod = (m_mod):: GetProcAddress (hinst, "mod"); int a = n, b = 6;int Res = Mymod (A, b); CString Str;str. Format (_t ("A for remainder b=%d"), res); AfxMessageBox (str);}Second, Mfc-dll1. Mfc-dll will call code in InitInstance when loading, exit loa
the specified memory address, instead it must use instructions that change the instruction pointer to change the next instruction of the pre-access cache, which is called the branch instruction. The branch instruction can change the value of the EIP register, either unconditionally or by conditional change. when a program encounters a jump, call, or interrupt, the instruction pointer automatically jumps to another location.
Jump Instructions
The jump instruction uses a single ins
table entry 0000:0634-Dec CX. # entries left 0000:0635 jz short Loc_tabok, all entries look OK 0000:0637 2C CMP [Si],ch; Other entries = 0? 0000:0639 F6 JE Loc_nextrpe; Yes, this one is OK 0000:063b Loc_bad:; Found a invalid entry: ; A). From 0624:boot ID!=0 and!=80h ; B. From 0639:multi entries with id=80h 0000:063b. is 0710 mov si,offset msg1+1; ' Invalid partition '
0000:063e loc_halt:; show msg then halt 0000:063e 4E Dec si 0000:063f loc_msg:; xref 064B, 06BA 0000:063f AC LODSB
entering the sub-call (used for the stack balance of the sub-call), after exiting, the original ebp value will be restored according to * pop EBP.
Taking this sentence as a breakthrough means that as long as we can break through the "top-Layer Program", we can observe the ESP value of EBP when the shell is between JMP and OEP.
3. Practice
Let's take a look at the pespin1.1 shell. In the pespin1.0 shell, we can easily find the place of stolen code usi
enlighten us!
[Cracking tool]: Modified TRW2000 doll version, Ollydbg1.09, PEiD, LordPE, ImportREC, W32Dasm 9.0 platinum Edition
---------------------------------[Process ]:This is the first easy-to-use language written in my opinion. ^ O ^ all the operations and comparisons are completed in the easy-to-run library. This version was obtained a long time ago and has been available for trial recently.---------------------------------I. shelling
Chaoshi.exe is the ASPack 2.12 shell, which can be d
pixel. --------------------------------------------------------------------------- Example: [cpp] # This program draws a straight line in graphics mode. #2012-12-24 # guzhoudiaoke@126.com. section. text. global _ start. code16 _ start: jmp main clear_screen: # clear screen function movb $0x06, % ah # function no. 0x06 movb $0, % al # Roll up all rows, movb $0, % ch # movb $0 in the upper left corner of the screen, % ch # movb $24 in the upper left co
unconditional transfer commands, JMP, and so on, that can be used to judge the condition of if, for, and while in a high-level language. Some directives that change status flags, such as CMP, are usually used before these instructions.Among them, what can be learned in this experiment is. The student variable is defined in the data segment and contains 100-byte elements. This is the same as the concept of arrays in high-level languages. In fact, reca
the size of the first virus code block
Lea EAX, [ebp+edi-04h]
mov [EAX], ebx
; Set the first block of viruses
Push ebx; The size of the first block of the virus code
Add edx, EDI
push edx; file pointer
Lea EDI, (myvirusstart-@9) [esi]
Push EDI; buffer address
Modify the entrance of the addressofentrypoint for the virus entrance
MOV (NEWADDRESSOFENTRYPOINT-@9) [esi], edx; Save a new program entry (virus text)
; Set Initial data
Lea edx, [esi-sizeofscetiontable]; EdX first min
Shelling software: MultiTranse 4.1.1: Http://www.tialsoft.com/download/Software Description: MultiTranse is a software that employs free online resources to translate to/from 13 different ages.Shelling method: Execryptor 2.xAuthor's statement: I am only interested. If you make mistakes, please correct them.
1. Use HidaOD to hide the OLLYDBG_Execryptor (for debugging the OD of Execryptor, see the link below). After stopping the system breakpoint, run the BypassAnti script and there will be some e
Ad removal principle:
Here, of course, the middlebeer method MoveWindow (hwndChild, true) is used );The advertisement bar class is TGradualPanel.
Ad Analysis1. peidcheck main program: thunder.exe, no shell, Borland Delphi 6.0-7.0 compilation.
2. Use ollydbg to load Thunder.exe and then run the breakpoint bpx ShowWindow
00495474. 50 push eax00495475. 8B45 FC mov eax, dword ptr ss: [ebp-4]00495478. E8 F38DFEFF call Thunder1.0047E2700049547D. 50 push eax; | hWnd is disconnected under this0049547E.
Instructions:Push ebpMov ebp, espInc ecxPush edxNopPop edxDec ecxPop ebpInc ecxOriginal jmp entry
1. Disguised vc
The entry code of the VC ++ program:PUSH EBPMov ebp, ESPPUSH-1Push 415448 -\___PUSH 4021A8-/in this Code, operations similar to this can be left blankMov eax, dword ptr fs: [0]PUSH EAXMov dword ptr fs: [0], ESPAdd esp,-6CPUSH EBXPUSH ESIPUSH EDIAdd byte ptr ds: [EAX], AL/this command can be left blank!
[Author mailbox]: a474528738@163.com[Software name]: XXX email promotion[Tools]: OD, exeinfoPE[Operating platform]: XP SP3[Author's statement]: I am only interested and have no other purpose. For errors, please enlighten us!--------------------------------------------------------------------------------[Detailed process]The Zp shelling instance information is relatively small in our forum. I saw a ZP shelling software on my computer, so I took it off and wrote it to me.. Mistakes and omissions a
, this problem is not representative. Uncle Bill's staff missed the widechar length, released the variables on the stack as a heap, and added the address content to the user, the only difference is that we don't have to confuse hexadecimal with hexadecimal. However, since the organizer writes it like this, let's take a look. In fact, after reverse partitioning, You can overwrite ret as a template, and then find jmp esp in the code page. Then, it's eas
QQ: 1151639935
Today, when I was studying the process of virus infection with PE executable files, I occasionally found that programs compiled by the VB6.0 compiler have a feature, that is, it can prevent the infection of some viruses (note that it can only prevent the infection of some viruses ). So what exactly is this? See the following analysis:
After learning the principles of virus infection PE files, I tried to manually infect another PE program to verify the accuracy of my knowledge. The
tag: blog OS Ar data 2014 Div art log on /*************************************** * ************ Name: the 4byte platform for the standard redfa remote control receiver is: the sn8p2511 mode is set to 100u *************************** **************************/; register definition sts1 DS 1f_irecok equ sts1. 0; receive a pair of Data t_irsta DS 1t_irnumposi DS 1; High level counter r_irdat1 DS 1; Receive Buffer r_irdat2 DS 1r_irdat3 DS 1r_irdat4 DS limit DS 1; the data received successfully; th
program:
Int iarray [8];
Below are the values of iArray and its elements obtained in C and Assembly expressions:
_ AsmCSizeLENGTH iArraySizeof (iArray)/sizeof (iArray [0])8SIZE iArraySizeof (iArray)32TYPE iArraySizeof (iArray [0])4
8. Notes
The comments in the assembly language can be used in inline assembly, that is, ";". For example:
_ Asm mov eax, OFFSET pbBuff; Load address of pbBuff
The C/C ++ Macro will be moved to a logic line. To avoid confusion caused by the use of assembly langu
Vbprogram anti-virus features and Virus Infection
Author: Fu Bo Lanzhou University of Technology International Trade Major QQ: 1151639935
Today, when I was studying the process of virus infection with PE executable files, I occasionally found that programs compiled by the VB6.0 compiler have a feature, that is, it can prevent the infection of some viruses (note that it can only prevent the infection of some viruses ). So what exactly is this? See the following analysis:
After learning the princi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.