亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 29a-7.006

?? 從29A上收集的病毒源碼
?? 006
?? 第 1 頁 / 共 2 頁
字號(hào):

                                 HaX0R'Z KiT
                                 ===========
                                    v1.05

  CONTENTS
  ~~~~~~~~

  0. About & Credits
  1. Process manager
  1.1. System process list
  1.2. Process inheritance
  1.3. Module list
  1.4. SFP enabling & disabling
  1.5. Dumping process's memory contents
  1.6. Dumping physical memory
  1.7. Kill & patch process
  2. Service manager
  3. Packet-related (crcpkt & spoofer)
  4. Sniffer
  5. ICMP Pinger/Scanner/Spoofer/Flooder
  6. Registry
  7. Disassembler/trojanizer (previously REVERT tool, MISTFALL-based)
  8. Binary --> source/echo conversion
  9. FakeExec
  10. API<-->CRC conversion
  11. Other shit

  0. About & Credits

  HaX0R'Z KiT is just an all-in-one collection of some tiny security-related
  programs... just because its hard to publish all that stuff separately... ;-)

  Since we all hate scr1pt kiddi3z, this is not a trojan nor rootkit,
  and there is no autorun or stealth features here.

  HKIT were designed for 2K/XP systems, it doesnt uses own driver(s),
  all network io is performed using raw-sockets, and mostly all
  features requires system/admin privileges.

  I should thank Ratter/29A for writing Insider and FakeExec,
  since these great tools were (maybe partially) used in this project.

  Also, greets goes to unknown author(s) of the PasswordReminder tool
  (www.smidgeonsoft.com ?), because its source were used here.

  The following text shows some aspects of hkit usage.
  Detailed information can be obtained from sources, for sure.

  1. Process manager

  1.1. System process list

  In the Win2K/XP systems, process list can be obtained by means of
  NTDLL::NtQuerySystemInformation.
  More information can be found in the 2K INTERNALS book.

  Each process is described by the SYSTEM_PROCESS_INFORMATION structure,
  which contains many interesting entries, including:

  - ImageName (ptr to wide-char string -- main exe's full name),
  - UniqueProcessId (PID),
  - InheritedFromUniqueProcessId (PPID).

  Using these three entries, process inheritance tree can be built.

  Use "hkit /process /list" to show system process list.

  1.2. Process inheritance

  Each process has been executed by another process.
  As such, for each process there exists process id (PID),
  and parent process id (PPID).

  So, if your process spawns another process, relation can be found.

  Lets do the following:
  - run cmd.exe
  - in the command line, type 'calc' and watch how calc is executed
  - go to task manager (taskmgr), right-click on just-executed cmd.exe,
    and run 'End Process Tree'
  - calc is died

  Now, lets do the following:
  - run cmd.exe
  - type 'cmd' to run another cmd
  - type 'calc'
  - type 'exit
  - now, go to task manager, choose cmd and kill process tree
  - calc is NOT died

  This means, that you can hide that fact, that your process is
  parent of another process(es),
  by means of executing temporary processes.

  And here exists lil feature.
  What if parent process already died,
  but some new process got the same pid as parent's ?

  This problem can be solved by means of SYSTEM_PROCESS_INFORMATION::CreateTime,
  i.e. if parent process has been executed after the child process,
  this is not the real parent, but just a process with equal pid.

  Use "hkit /process /tree" to show system process tree.

  1.3. Module list

  Module list can be obtained using PSAPI, even in 9X systems having psapi.dll.

  This is useful if you want to find out which modules (DLL's)
  are used by some process,
  including ones absent within imports but loaded using LoadLibrary.

  Use "hkit /process /mod" to show all processes and used modules.
  Use "hkit /process /mod far.exe" to show all modules for process specified
  by pid or name.

  1.4. SFP enabling & disabling

  Here are two sets of instructions, which corresponds to enabled (original)
  and disabled (patched) SFP states.
  This code is located in the 2K::SFC.DLL or XP::SFC_OS.DLL

   --- ENABLED ---                    --- DISABLED ---

 re:
   xx xx xx xx xx                     68E8030000    push 1000
   xx xx xx xx xx                     B800000000    mov eax, offset k32.Sleep()
   xx xx                              FFD0          call eax
 waitcycle:
   6A 00              push 0          9090          nop's
   6A 01              push 1          9090          nop's
   6A 01              push 1          9090          nop's
   FF 33              push [ebx]      9090          nop's
   FF 73 04           push [ebx+4]    909090        nop's
   FF 15 xx xx xx xx  call NtWaitForMultipleObjects nop's
   xx xx                              EBE1          jmp re

  As you can see, patch is written in such way that SFP can be enabled or
  disabled at any moment w/o risk of breaking normal sfc code execution.

  Use "hkit /process /sfpdisable" to disable sfp.
  Use "hkit /process /sfpenable" to enable sfp.

  1.5. Dumping process's memory contents

  Use "hkit /process /dump process.exe process.dmp" to
  dump all process's memory into file.
  Process can be specified by pid or by name.

  Process dump file format consists of HEADER entrie(s),
  possibly followed by DATA entrie(s).

  Header block has the following format:

  DWORD            0x11111111                    ; id
  DWORD            0x1C                          ; sizeof(mb)
  BYTE*sizeof(mb)  MEMORY_BASIC_INFORMATION mb   ; see WIN32.HLP for details

  Data block has the following format:

  DWORD            0x22222222                    ; id
  DWORD            va                            ; 4k-aligned
  DWORD            datasize                      ; 4k-aligned, max=64k
  BYTE*datasize    data                          ; dumped data

  1.6. Dumping physical memory

  Physical memory size can be found using GlobalMemoryStatus() api.
  Physical memory can be mapped into virtual addresses using
  NtMapViewOfSection() native function.

  Use "hkit /process /physmem memory.dmp" to dump physical memory into file.

  Physical memory dump file format is just a plain binary file
  containing physical pages.

  Here (probably) is a bug, or feature, in cases when physical memory
  could not fit into virtual addresses. This should be fixed in future.

  1.7. Kill & patch process

  Use "hkit /process /kill process.exe" to terminate some process, specified
  by pid or by name.

  Use "hkit /process /patch process.exe 00401234 CC C3" to
  insert some code at the specified address into some process,
  specified by pid or by name.
  This can help in cases when s-ice doesnt worx properly.

  2. Service manager

  Use for example "hkit /service /create Fuck c:\winnt\system32\fuck.sys /auto"
  to register service.
  Use "/createkd" instead to register kernel driver.
  Use "hkit /service /start|stop|pause|continue|delete ServiceName" to control

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩欧美不卡一区| 欧美日韩成人综合天天影院| 精品国产三级a在线观看| 日韩国产高清影视| 精品少妇一区二区三区日产乱码| 蜜臀精品久久久久久蜜臀| 91麻豆精品国产| 男男成人高潮片免费网站| 日韩三级免费观看| 国产成人精品影视| 最新热久久免费视频| 欧美日韩亚洲高清一区二区| 日本少妇一区二区| 久久免费午夜影院| 91免费视频网址| 午夜免费欧美电影| 久久婷婷色综合| 一本一本久久a久久精品综合麻豆| 亚洲综合丝袜美腿| 日韩你懂的在线观看| 高清成人免费视频| 一区二区三区四区中文字幕| 欧美一区二区三区在线观看视频| 国产精品一区专区| 一区二区三区欧美视频| 欧美大片国产精品| 色综合久久久久久久| 青青草原综合久久大伊人精品| 久久青草国产手机看片福利盒子| 成人国产免费视频| 天天色天天操综合| 国产精品美日韩| 91精品国产品国语在线不卡| 懂色一区二区三区免费观看| 亚洲国产精品一区二区www在线| 久久五月婷婷丁香社区| 欧美午夜理伦三级在线观看| 国产伦精品一区二区三区在线观看| 亚洲老妇xxxxxx| 久久毛片高清国产| 欧美肥妇毛茸茸| 99精品久久久久久| 国产乱子伦视频一区二区三区| 亚洲一区二区五区| 国产精品久久久久久久久果冻传媒| 91精品国产综合久久香蕉麻豆| 欧美系列一区二区| 成人精品高清在线| 韩国女主播一区| 日产欧产美韩系列久久99| 中文字幕一区二区三区视频| 久久综合九色综合欧美就去吻| 欧美日韩一区二区电影| 不卡欧美aaaaa| 国产精品综合二区| 免费精品视频最新在线| 亚洲成av人片一区二区| 亚洲免费观看高清完整版在线| 久久人人爽人人爽| 欧美mv和日韩mv的网站| 欧美一三区三区四区免费在线看 | 韩国v欧美v亚洲v日本v| 亚洲高清视频中文字幕| 亚洲色大成网站www久久九九| 久久夜色精品一区| 日韩精品一区二区三区中文精品 | 91网站最新地址| 国产成人精品影院| 国产一区亚洲一区| 国产中文一区二区三区| 国内精品国产三级国产a久久| 精品一二三四在线| 久久电影网电视剧免费观看| 日本伊人精品一区二区三区观看方式| 亚洲一二三区在线观看| 亚洲精品国产一区二区三区四区在线| 久久不见久久见免费视频7| 一区二区三区.www| 亚洲一区二区三区四区五区黄| 亚洲猫色日本管| 亚洲黄网站在线观看| 尤物视频一区二区| 亚洲一区二区三区爽爽爽爽爽 | 亚洲成人在线免费| 亚洲高清三级视频| 日韩福利电影在线观看| 麻豆精品一二三| 国产又黄又大久久| 国产91色综合久久免费分享| 国产成人精品免费网站| jlzzjlzz亚洲日本少妇| 色综合天天在线| 欧美色大人视频| 日韩欧美不卡在线观看视频| 国产欧美一区二区在线| 国产精品毛片高清在线完整版 | 在线不卡一区二区| 欧美日韩国产欧美日美国产精品| 7777女厕盗摄久久久| 欧美xxxxx牲另类人与| 国产欧美精品国产国产专区 | 国产三级一区二区| 国产精品乱人伦| 亚洲免费高清视频在线| 五月开心婷婷久久| 韩国精品久久久| 91网站在线观看视频| 欧美一级片免费看| 中文字幕不卡的av| 亚洲成人一区二区| 国产一区二区三区日韩| 91女神在线视频| 精品嫩草影院久久| 成人欧美一区二区三区黑人麻豆| 天天色综合天天| av资源网一区| 欧美一区二区三区在线电影| 国产精品久久久久久久久免费桃花| 亚洲高清一区二区三区| 国产成人啪免费观看软件| 欧美日韩在线播放一区| 久久精品人人爽人人爽| 亚洲一区二区三区在线| 成人午夜电影网站| 91精品久久久久久久久99蜜臂| 国产精品国产三级国产普通话99 | 精品一区二区三区不卡| 91在线免费播放| 精品久久五月天| 亚洲自拍都市欧美小说| 丰满白嫩尤物一区二区| 91精品国产综合久久久蜜臀粉嫩| 日本一区二区三区视频视频| 日韩—二三区免费观看av| a亚洲天堂av| 久久久午夜精品| 美女网站色91| 欧美日韩五月天| 亚洲日本在线看| 成人av资源在线观看| 久久无码av三级| 麻豆91在线播放免费| 色综合天天视频在线观看| 久久亚洲影视婷婷| 日本伊人午夜精品| 欧美精品一级二级| 亚洲精品大片www| 99久久久久免费精品国产| 久久久亚洲综合| 国产呦精品一区二区三区网站| 欧美一区二区三区公司| 亚洲成人激情综合网| 色综合天天性综合| 亚洲欧洲制服丝袜| av一区二区三区四区| 日本一区二区三区国色天香| 极品美女销魂一区二区三区| 欧美一区二区三区免费视频 | 欧美疯狂性受xxxxx喷水图片| 一区二区三区中文字幕精品精品 | 色欧美88888久久久久久影院| 国产欧美一区二区三区网站| 国内国产精品久久| 久久久亚洲午夜电影| 国产精品18久久久久久久久久久久| 日韩精品一区二区三区老鸭窝 | 国产91在线观看| 亚洲国产岛国毛片在线| 国产99久久久国产精品潘金| 国产日韩欧美综合一区| 成人黄色国产精品网站大全在线免费观看| 国产日产欧美一区二区视频| 国产91在线看| 亚洲色图视频网| 91精品1区2区| 天天操天天干天天综合网| 欧美日本在线播放| 日本aⅴ亚洲精品中文乱码| 精品精品欲导航| 国产成人日日夜夜| 最新不卡av在线| 欧美性色黄大片| 美国毛片一区二区| 久久色视频免费观看| 国产99精品视频| 亚洲一区二区三区四区在线免费观看| 欧美日韩精品福利| 久久99精品国产麻豆婷婷洗澡| 国产亚洲精品中文字幕| 99re这里只有精品首页| 亚洲高清视频在线| 精品国产乱码久久久久久久| 国产成人8x视频一区二区| 伊人婷婷欧美激情| 日韩一区二区三区视频| 成人性生交大合| 午夜婷婷国产麻豆精品| 久久日一线二线三线suv| 91一区二区三区在线观看| 亚洲123区在线观看|