亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? stream.asm

?? Win2k.Stream病毒,好不容易才找到的!喜歡匯編的朋友支持一下。
?? ASM
?? 第 1 頁(yè) / 共 2 頁(yè)
字號(hào):

COMMENT# 

* Win2k.Stream

---------------------------
* by Benny/29A and Ratter 
---------------------------


Let us introduce very small and simple infector presenting how to use features 
of NTFS in viruses. This virus loox like standard Petite-compressed PE file. 
However, it presents the newest way of PE file infecting method. 

How the virus worx? It uses streamz, the newest feature of NTFS filesystem 
and file compression, already implemented in old NTFS fs. 


------------------------------------- 
* Basic principles of NTFS streamz 
-------------------------------------

How the file loox? Ya know that the file contains exactly the same what you can 
see when you will open it (e.g. in WinCommander). NTFS, implemented by 
Windows 2000, has new feature - the file can be divided to streamz. The content 
what you can see when you will open the file is called Primary stream - usually 
files haven't more than one stream. However, you can create NEW stream ( = new 
content) in already existing file without overwritting the content. 

Example: 

addressing of primary stream -> <filename> e.g. "calc.exe" 
addressing of other streamz -> <filename>:<stream name> e.g. "calc.exe:stream" 

If you have NTFS, you can test it. Copy to NTFS for instance "calc.exe", and 
then create new file "calc.exe:stream" and write there "blahblah". Open 
"calc.exe". Whats there? Calculator ofcoz. Now open "calc.exe:stream". Whats 
there? "blahblah", the new file in the old one :) 

Can you imagine how useful r streamz for virus coding? 

The virus infects file by moving the old content to the new stream and replacing 
the primary stream with virus code. 

File (calc.exe) before infection: 

-Calc.exe----------------------------
rimary stream (visible part) 
Calculator 
-------------------------------------

File (calc.exe) after infection: 

-Calc.exe----------------------------
rimary stream (calc.exe)
Next stream (calc.exe:STR) 
Virus  Calculator 
-------------------------------------

Simple and efficent, ain't it? 

---------------------
* Details of virus  
---------------------

* The virus infects all EXE files in actual directory. 

* The virus uses as already-infected mark file compression. All infected 
 files are compressed by NTFS and virus then does not infect already 
 compressed files. Well, almost all files after infection r smaller than 
 before, so user won't recognize virus by checking free disk space :) 

* If user will copy the infected file to non-NTFS partition (in this case 
 only primary stream is copied), the host program will be destroyed and 
 instead of running host program virus will show message box. That can 
 be also called as payload :P 

* The virus is very small, exactly 3628 bytes, becoz it's compressed by 
 Petite 2.1 PE compression utility (http://www.icl.ndirect.co.uk/petite/). 

* The disinfection is very easy - just copy the content of <file>:STR to 
 <file> and delete <file>:STR. If you want to create sample of infected 
 file, then just copy the virus to some file and copy any program (host 
 program) to <file>:STR. Thats all! However, AVerz have to rebuild their 
 search engine to remove this virus, becoz until now, they had no fucking 
 idea what are streamz :) 

* This virus was coded in Czech Republic by Benny/29A and Ratter, on our 
 common VX meeting at Ratter's city... we just coded it to show that 
 Windows 2000 is just another OS designed for viruses... it really is :) 

* We would like to thank GriYo for pointing us to NTFS new features. 
 The fame is also yourz, friend! 


----------------
* In the media   
---------------- 


AVP's description: 


This is the first known Windows virus using the "stream companion" infection 
method. That method is based on an NTFS feature that allows to create multiple 
data streams associated with a file. 

*NTFS Streams* 

Each file contains at least one default data stream that is accessed just by 
the file name. Each file may also contain additional stream(s) that can be 
accessed by their personal names (filename:streamname). 

The default file stream is the file body itself (in pre-NTFS terms). For 
instance, when an EXE file is executed the program is read from the default 
file stream; when a document is opened, its content is also read from the 
default stream. 

Additional file streams may contain any data. The streams cannot be accessed or 
modified without reference to the file. When the file is deleted, its streams 
are deleted as well; if the file is renamed, the streams follow its new name. 

In the Windows package there is no standard tool to view/edit file streams. To 
"manually" view file streams you need to use special utilities, for instance 
the FAR utility with the file steams support plug-in (Ctrl-PgDn displays file 
streams for selected file). 

*Virus Details* 
         

The virus itself is a Windows application (PE EXE file) compressed using the 
Petite PE EXE file compressor and is about 4K in size. When run it infects all 
EXE files in the current directory and then returns control to the host file. 
If any error occurs, the virus displays the message: 

Win2k.Stream by Benny/29A & Ratter 
This cell has been infected by [Win2k.Stream] virus! 

While infecting a file the virus creates a new stream associated with the victim 
file. That stream has the name "STR", i.e. the complete stream name is 
"FileName:STR". The virus then moves the victim file body to the STR stream 
(default stream, see above) and then overwrites the victim file body (default 
stream) with its (virus) code. 

As a result, when an infected file is executed Windows reads the default stream 
(which is overwritten by virus code) and executes it. Also, Windows reports the 
same file size for all infected files - that is the virus length. 

To release control to the host program the virus just creates a new process by 
accessing the original file program using the name "FileName:STR". 

That infection method should work on any NTFS system, but the virus checks the 
system version and runs only under Win2000. 


AVP's press release: 


*A New Generation of Windows 2000 Viruses is Streaming Towards PC Users* 
                                     

Moscow, Russia, September 4, 2000 ?Kaspersky Lab announces the discovery of 
W2K.Stream virus, which represents a new generation of malicious programs for 
Windows 2000. This virus uses a new breakthrough technology based on the 
"Stream Companion" method for self-embedding into the NTFS file system. 

The virus originates from the Czech Republic and was created at the end of 
August by the hackers going by the pseudonyms of Benny and Ratter. To date, 
Kaspersky Lab has not registered any infections resulting from this virus; 
however, its working capacity and ability for existence "in-the-wild" are 
unchallenged. 

"Certainly, this virus begins a new era in computer virus creation," said 
Eugene Kaspersky, Head of Anti-Virus Research at Kaspersky Lab. "The stream 
Companion technology the virus uses to plant itself into files makes its 
detection and disinfection extremely difficult to complete. 

Unlike previously known methods of file infection (adding the virus body at 
beginning, ending or any other part of a host file), the "Stream" virus 
exploits the NTFS file system (Windows NT/2000) feature, which allows multiple 
data streams. For instance, in Windows 95/98 (FAT) files, there is only one 
data stream the program code itself. Windows NT/2000 (NTFS) enables users 
to create any number of data streams within the file: independent executable 
program modules, as well as various service streams (file access rights, 
encryption data, processing time etc.). This makes NTFS files very flexible, 
allowing for the creation of user-defined data streams aimed at completing 
specific tasks. 

"Stream" is the first known virus that uses the feature of creating multiple 
data streams for infecting files of the NTFS file system (see picture 1). To 
complete this, the virus creates an additional data stream named "STR" and 
moves the original content of the host program there. Then, it replaces the 
main data stream with the virus code. As a result, when the infected program 
is run, the virus takes control, completes the replicating procedure and then 
passes control to the host program. 

*"Stream" file infection procedure* 
                   

File before infection File after infection 


"By default, anti-virus programs check only the main data stream. There will be 
no problems protecting users from this particular virus," Eugene Kaspersky 
continues. "However, the viruses can move to additional data streams. In this 
case, many anti-virus products will become obsolete, and their vendors will be 
forced to urgently redesign their anti-virus engines." 


In MSNBC's news: 


*New trick can hide computer viruses* 
*But experts question danger posed by stream technology* 

Sept. 6 A new kind of computer virus has been released, but security experts 
are in disagreement over just how menacing it is. The virus demonstrates a 
technique that future writers can use to hide their malicious software from 
most current antivirus scanners. But some antivirus companies are playing down 
the threat. 

THE VIRUS, CALLED W2K.STREAM, poses little threat it was written as a 
relatively benign roof of concept.But, according to a source who requested 
anonymity, it was posted on several virus writer Web sites over Labor Day 
weekend ?making copycats possible. 

The virus takes advantage of a little-used feature included in Windows 2000 and 
older Windows NT systems that allows programs to be split into pieces called 
streams. Generally, the body of a program resides in the main stream. But other 
streams can be created to store information related to what in the main 
stream. Joel Scambray, author of acking Exposed,described these additional 
streams as lost-it notes attached to the main file. 

The problem is that antivirus programs only examine the main stream. W2K.Stream 
demonstrates a programmer ability to create an additional stream and hide 
malicious code there. 

ertainly, this virus begins a new era in computer virus creation,said 
Eugene Kaspersky, Head of Anti-Virus Research at Kaspersky Lab, in a press 
release. he stream Companion technology the virus uses to plant itself into 
files makes its detection and disinfection extremely difficult to complete. 

*THIS BUG ISN DANGEROUS* 


No W2K.stream infections have been reported, and experts done believe the 
virus is in the wild  circulating on the Internet yet. At any rate, this 
virus actually makes things easy for antivirus companies. If a user is 
infected, the program creates an alternate stream and places the legitimate 
file in this alternate location; the virus replaces it as the main stream. That 
makes detection by current antivirus products easy. But future viruses could 
do just the opposite, evading current antivirus products. 

One antivirus researcher who requested anonymity called release of the bug 
omewhat akin to the first macro virus.He added that reengineering antivirus 
software to scan for multiple streams would be a complicated effort. 
this case, many anti-virus products will become obsolete, and their vendors 
will be forced to urgently redesign their anti-virus engines, Kaspersky said. 

*AN OLD ISSUE* 
       - 

There is nothing new about the potential of exploiting the multiple stream 
issue; Scambray hints at the problem in the book acking Exposed,and 
described it even more explicitly in a 1998 Infoworld.com article. 

The SANS Institute, a group of security researchers, issued an lert 
criticizing antivirus companies for not updating their products to scan the 
contents of any file stream earlier. 

found that the scanners were incapable of identifying viruses stored within 
an alternate data stream,the report said. or example if you create the file 
MyResume.doc:ILOVEYOU.vbs and store the contents of the I Love You virus within 
the alternate data stream file, none of the tested virus scanners were capable 
of finding the virus during a complete disk scan. 

But some antivirus companies described the threat as minimal because the 
alternate stream trick only hides the bug while it stored on a victim 
computer. Pirkka Palomaki, Director of Product Marketing for F-Secure Corp., 
said for the virus to actually run, it has to come out of hiding and load into 
main memory. 

it would be detected as it tried to activate, Palomaki said. but this 
signifies importance of real-time protection. He added the virus would still 
have to find its way onto a victim computer; and that victim would have to 
be tricked into installing the virus using one of the traditional methods, 
such as clicking on an infected e-mail attachment. 

it could increase the ability to for scanners to miss something, said Pat 
Nolan, virus researcher at McAfee Corp. but we are on top of it. If there is 
a vulnerability, it will be short-lived.


-----------------------
* How to compile it?  
-----------------------

Use Petite version 2.1 (http://www.icl.ndirect.co.uk/petite/). 

tasm32 /ml /m9 /q stream 
tlink32 -Tpe -c -x -aa stream,,,import32 
pewrsec stream.exe 
petite -9 -e2 -v1 -p1 -y -b0 -r* stream.exe 



And here comes the virus source... /#

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩综合一区| 国产欧美精品一区二区三区四区| 欧美精品vⅰdeose4hd| 国产午夜精品在线观看| 亚洲国产一区在线观看| 国产曰批免费观看久久久| 91亚洲精华国产精华精华液| 日韩视频在线一区二区| 亚洲六月丁香色婷婷综合久久| 激情综合五月婷婷| 欧美日韩国产首页在线观看| 亚洲精品视频观看| 风间由美性色一区二区三区| 日韩欧美中文字幕公布| 亚洲国产日产av| 91网站视频在线观看| 国产欧美一区二区精品仙草咪| 日韩和的一区二区| 在线观看av一区二区| 亚洲欧美日韩电影| 91美女福利视频| 亚洲天堂福利av| 91亚洲国产成人精品一区二区三| 久久精品亚洲麻豆av一区二区 | 欧美二区三区91| 亚洲欧美另类在线| 99久久精品国产导航| 久久精品无码一区二区三区| 国内偷窥港台综合视频在线播放| 欧美一区二区视频网站| 日韩激情视频在线观看| 91精品国产综合久久香蕉的特点| 性欧美疯狂xxxxbbbb| 精品视频在线免费看| 亚洲图片有声小说| 91精品国产一区二区| 日本欧美加勒比视频| 精品三级在线观看| 国产一区二区在线电影| 日本一二三四高清不卡| av亚洲产国偷v产偷v自拍| 成人免费视频在线观看| 色婷婷激情一区二区三区| 一区二区三区精品在线观看| 一本久久综合亚洲鲁鲁五月天 | 欧美一级艳片视频免费观看| 日韩黄色一级片| 26uuu精品一区二区在线观看| 久久电影网站中文字幕| 久久久99精品免费观看| zzijzzij亚洲日本少妇熟睡| 亚洲精品视频免费看| 欧美日本不卡视频| 精品一区二区三区在线观看| 国产日韩欧美高清在线| 在线精品国精品国产尤物884a| 午夜激情综合网| 久久一二三国产| 91美女蜜桃在线| 久久国内精品视频| 国产精品第13页| 欧美日本视频在线| 高清久久久久久| 亚洲第一福利一区| 久久精品一区四区| 欧美在线观看一区| 国产伦精一区二区三区| 亚洲乱码国产乱码精品精98午夜| 日韩午夜激情免费电影| 91污在线观看| 极品美女销魂一区二区三区| 亚洲精品一二三| 久久夜色精品国产噜噜av| 91论坛在线播放| 国产一区二区三区四区五区美女| 亚洲婷婷综合久久一本伊一区| 欧美mv和日韩mv的网站| 在线免费视频一区二区| 高清视频一区二区| 奇米色一区二区三区四区| 综合久久久久综合| 欧美sm美女调教| 欧美猛男超大videosgay| 国产高清在线观看免费不卡| 亚洲国产欧美日韩另类综合 | 国产欧美日本一区二区三区| 欧美色网一区二区| 成人免费毛片aaaaa**| 日韩综合小视频| 亚洲欧美日韩一区| 欧美国产综合一区二区| 精品人伦一区二区色婷婷| 欧美性大战久久久| 99在线热播精品免费| 国产精品影视天天线| 日韩av二区在线播放| 一区二区三区久久| 亚洲精品国产视频| 国产精品免费视频网站| 26uuu久久天堂性欧美| 日韩精品在线一区二区| 欧美日韩精品一区二区天天拍小说 | 欧美人妇做爰xxxⅹ性高电影| av男人天堂一区| 国产·精品毛片| 国产自产高清不卡| 久久99国产乱子伦精品免费| 亚洲综合小说图片| 亚洲黄色录像片| 亚洲美女免费视频| 亚洲三级小视频| 亚洲欧美日韩在线| 亚洲日本丝袜连裤袜办公室| 最新日韩av在线| 亚洲欧美综合另类在线卡通| 久久久精品免费观看| 国产网红主播福利一区二区| 欧美精品一区二区三区一线天视频| 日韩一区二区三区视频| 日韩欧美国产午夜精品| 日韩三级电影网址| 日韩久久精品一区| 国产亚洲成年网址在线观看| 欧美国产一区在线| 中文字幕欧美一| 亚洲制服丝袜一区| 日韩电影一二三区| 国产自产视频一区二区三区| 粉嫩av一区二区三区粉嫩 | 国产日韩欧美在线一区| 亚洲国产精品激情在线观看| 亚洲欧美一区二区三区极速播放 | 国产婷婷色一区二区三区四区| 欧美激情在线一区二区三区| 亚洲人成7777| 亚洲电影一区二区三区| 蜜桃视频在线观看一区| 国产一区在线精品| 成人av午夜电影| 成人免费小视频| 亚洲综合激情网| 美国一区二区三区在线播放| 国精产品一区一区三区mba桃花| 国产成人精品亚洲日本在线桃色| 91免费视频观看| 欧美一区二区三区影视| 久久久噜噜噜久噜久久综合| 国产精品久久久久久福利一牛影视| 一区2区3区在线看| 久久精品国产99国产| 一本到三区不卡视频| 日韩精品专区在线| 亚洲天堂免费在线观看视频| 午夜精品久久久久久不卡8050| 精品一区二区影视| 在线观看亚洲精品视频| 精品播放一区二区| 一区二区三区91| 国产麻豆精品久久一二三| 欧美亚洲丝袜传媒另类| 久久噜噜亚洲综合| 亚洲第一在线综合网站| 国产69精品久久99不卡| 91精品欧美一区二区三区综合在| 国产亚洲一二三区| 日韩高清在线一区| 色综合久久综合| 久久午夜色播影院免费高清| 亚洲一区在线观看视频| 高清在线观看日韩| 精品国产免费一区二区三区香蕉| 91亚洲国产成人精品一区二区三| 国产欧美日本一区二区三区| 亚洲最色的网站| 91麻豆精品国产| 精品国产乱码久久久久久1区2区| 日韩毛片一二三区| 国产精品88av| 日韩欧美国产系列| 亚洲高清免费一级二级三级| 成人精品在线视频观看| 精品国产一区a| 视频一区视频二区中文字幕| 色综合久久久久久久久久久| 国产欧美日韩卡一| 国产伦精品一区二区三区在线观看| 777奇米四色成人影色区| 亚洲欧美日韩小说| 91丨九色丨国产丨porny| 日本一区二区成人| 成人av在线影院| 国产三级精品视频| 国产精品资源在线观看| 精品黑人一区二区三区久久| 视频一区视频二区中文| 欧美日韩成人一区二区| 日韩精品乱码av一区二区| 91精品欧美一区二区三区综合在| 亚洲 欧美综合在线网络| 欧美日韩国产精品成人|