-------- Patch PE files --------
We all know that there are many gaps in PE files, so we may patch PE files.
The practice is to insert our patch code in the gap.
In the following example, I want to teach you how to fill in the notepad.exe (Notepad) Program of win97.
Ding, run my pach.exe program at notepad.exeruntime:
1.insert in section gap of notepad.exe
ShellE
During the test, I felt that the efficiency was not very good. So I would like to express my gratitude to anyone who can provide valuable suggestions!
1. Traverse PE files on the disk
[CPP]
View plaincopyprint?
/*************************************** *********************************/
/* Function Description: traverses all EXE files in the specified drive.
/* Parameter: Drive name, such as C:
/* Return value: the number of traversal tasks.
/*
???? The previous days in the month race, got a Ubuntu14.04 server, but not root authority, need to raise power. I Google a bit and found cve-2015-1318,cve-2015-1328,cve-2015-1338 these can be used to power the CVE and POC. When I used the cve-2015-1328 to raise the right, a
1. Vulnerability related informationVulnerability name : Spring Integration Zip unsafe decompressionVulnerability number : cve-2018-1261Vulnerability Description : In versions prior to Spring-integration-zip.v1.0.1.release, a malicious user constructs a file containing a specific file name in a compressed file (the affected file format is bzip2, tar, XZ, war , Cpio, 7z), when an application uses Spring-integration-zip for decompression, it can cause a
After this year's Pwn2Own competition, VMware recently released updates for its ESXi, wordstation, and fusion products to fix some of the high-risk vulnerabilities uncovered in the hacker contest. In fact, before the tournament began, VMware urgently repaired a virtual machine escape vulnerability numbered cve-2017-4901.
And recently, someone on GitHub unveiled a VMware Virtual machine escape utility, which is the
This article is from Aliyun-yun-Habitat community, the original click here.
I. Overview of Vulnerabilities
September 19, 2017, Apache Tomcat official confirmed and fixed two high-risk vulnerabilities, vulnerability CVE number: cve-2017-12615 and cve-2017-12616, The vulnerability is affected by a version of 7.0-7.80, the official rating for high-risk, under cert
Objective:Oracle officially released the July Critical patch update CPU (Critical patch update), which fixes a high-risk vulnerability that could cause remote code execution cve-2018-2894:Http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlcve-2018-2894, a security researcher at China's National Internet Emergency Center Cncert Mingxuan Song and security researcher at Apple, David Litchfield, also submitted findings.The National
Android Privilege Elevation Vulnerability CVE-2014-7920 CVE-2014-7921 Analysis
This is Android mediaserver Elevation of Privilege Vulnerability, the use of CVE-2014-7920 and CVE-2014-7921 to achieve Elevation of Privilege, from 0 permission mentioned media permissions, where the C
Introduction to Android Privilege Elevation Vulnerability CVE-2014-7920 and CVE-2014-7921
This is Android mediaserver Elevation of Privilege Vulnerability, the use of CVE-2014-7920 and CVE-2014-7921 to achieve Elevation of Privilege, from 0 permission mentioned media permissions, where the
No feather @ Ali Mobile Security, more technical dry, please visit Ali Poly Security BlogThis is the right to exploit Android MediaServer, using cve-2014-7920 and cve-2014-7921 to implement the right, from 0 permissions mentioned media permissions, which cve-2014-7921 affect Android 4.0.3 and later versions, Cve-2014-7
CVE-2014-4114 and CVE-2014-3566, cve20144114
Those who are concerned about security over the past two days will pay special attention to these two new vulnerabilities: CVE-2014-4114 and CVE-2014-3566. The following is a brief description of these two vulnerabilities.
CVE-20
No feather @ Ali Mobile Security, more security technology dry, please visit the security blog Ali
This is the right to exploit Android MediaServer, using cve-2014-7920 and cve-2014-7921 to implement the right, from 0 permissions mentioned media permissions, which cve-2014-7921 affect Android 4.0.3 and later versions, C
PE Study Notes
PE means portable executable (portable execution body ). Overall hierarchical distribution of PE file structure:--------------| Dos MZ header || -------------- || Dos Stub || -------------- || PE Header || -------------- || Section Table || -------------- || Section 1 || -------------- || Section 2 || --
Summary of this chapter
· PE file Format overview
· PE file structure
· How to get Oep in a PE file
· How to get resources in a PE file
· How to modify the PE file to display an instance of the MessageBox 2.1 introduction
Typically, EXE files under windows are in
/*** CVE-2014-4014 Linux Kernel Local Privilege Escalation PoC** Vitaly Nikolenko* http://hashcrack.org** Usage: ./poc [file_path]* * where file_path is the file on which you want to set the sgid bit*/#define _GNU_SOURCE#include #include #include #include #include #include #include #include #include #define STACK_SIZE (1024 * 1024)static char child_stack[STACK_SIZE];struct args {int pipe_fd[2];char *file_path;};static int child(void *arg) {struct arg
CVE-2015-0235 lab record, cve-2015-0235 labAll-in-One and linux Server vulnerability analysis and repair! LINUX: 5.X 64 cell storage: 11.2.3.1.1# Patch packages required for vulnerabilities:Glibc-2.5-123.0.1.el5_11.1.i686.rpmGlibc-2.5-123.0.1.el5_11.1.x86_64.rpmGlibc-common-2.5-123.0.1.el5_11.1.x86_64.rpmGlibc-devel-2.5-123.0.1.el5_11.1.i386.rpmGlibc-devel-2.5-123.0.1.el5_11.1.x86_64.rpmGlibc-headers-2.5-12
Detailed description of PE File Format (Part 1)
Summary
Windows NT 3.1 introduces a new executable file format named PE file format. The PE file format specification is included in the msdn Cd (specs and strategy, specifications, Windows NT file format specifications), but it is very obscure.However, this document does not provide sufficient information, so devel
/faq/windows#q6http://drops.wooyun.org/papers/1377 4. Principle of vulnerability5. Patch Fix0x1:upgrade struts22.3. 16.1 is 2.3. 16.1 1.3. 1 " class " in struts-default. XML configuration of Parametersinterceptor.0x2:workaround:upgrade Commons-fileuploadThe fixed commons-fileupload library is a drop-in replacement for the vulnerable version. Deployed applications can be hardened by replacing the Commons-fileupload jar file in Web-inf/lib with the updated jar. For MavenBased Struts 2 projects,
Author: msdnAuthor: Li Ma (http://home.nuc.edu.cn /~ Titilima)
Summary
Windows NT 3.1 introduces a new executable file format named PE file format. The PE file format specification is included in the msdn Cd (specs and strategy, specifications, Windows NT file format specifications), but it is very obscure.However, this document does not provide sufficient information, so developers cannot understand the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.