亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? hacker+defender+rookit.txt

?? 木馬檢測工具
?? TXT
字號:
/*
* Rkdetector - Hacker Defender <=v1.0.0 Remote Scanner
*
* Author:
* Andr Tarasc Acu
* atarasco@sia.es http://www.siainternational.com
*
* rkdscan is able to remotely detect Comprimised computers with the rootkit
* Hacker Defender
*
*
* Greets to: Javier Olascoaga (Nessus Plugin )
* Sia - Tiger Team
*
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
* WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL SIA . BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
* CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF
* THIS SOFTWARE
*
*
* usage: rkdscan.exe xx.yy.zz.0 xx.yy.zz.255
*
* C:\rkdscan>rkdscan.exe xx.yy.zz.0 xx.yy.zz.255
* ROOTKIT SCANNER by Andres Tarasco. atarasco@sia.es
* [+] Targets: xx.yy.zz.43-xx.yy.zz.48 with 100 Threads
* Checking xx.yy.zz.44 port: 80...
* Checking xx.yy.zz.47 port: 80...
* Checking xx.yy.zz.48 port: 80...
* [+] IP: xx.yy.zz.47 port: 80 INFECTED with HACKER Defender v0.84 - v1.0.0
*
*
*
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <windows.h>
#include <process.h>
#include <time.h>

#define NTHREADS 150
#define CONNECT 8 //Connect Timeout
#define RECV 8 //recv Timeout

#define sleep(a) Sleep(a)

struct {
 unsigned char masterkey[32];
 char banner[256];
 } key[] = {
 { //unsigned char masterkey084 - v1.0.0
        0x01, 0x9a, 0x8c, 0x66, 0xaf, 0xc0, 0x4a, 0x11,
        0x9e, 0x3f, 0x40, 0x88, 0x12, 0x2c, 0x3a, 0x4a,
        0x84, 0x65, 0x38, 0xb0, 0xb4, 0x08, 0x0b, 0xaf,
        0xdb, 0xce, 0x02, 0x94, 0x34, 0x5f, 0x22, 0x00,
        "HACKER Defender v0.84 - v1.0.0",
 },
 { //unsigned char masterkey083[]
        0x01, 0x38, 0x45, 0x69, 0x3a, 0x1f, 0x44, 0x12,
        0x89, 0x55, 0x7f, 0xaa, 0xc0, 0x9f, 0xee, 0x61,
        0x3f, 0x9a, 0x7e, 0x84, 0x32, 0x04, 0x4e, 0x1d,
        0xd7, 0xe4, 0xa8, 0xc4, 0x48, 0xe8, 0x9e, 0x00,
        "HACKER DEFENDER v0.82 - 0.83",
 },

 { //masterkey for hxdef 051 - 073 - 080 and 081 and 082 beta
        0x01, 0x1e, 0x3c, 0x6c, 0x6a, 0xff, 0x99, 0xa8,
        0x34, 0x83, 0x38, 0x24, 0xa1, 0xa4, 0xf2, 0x11,
        0x5a, 0xd3, 0x18, 0x8d, 0xbc, 0xc4, 0x3e, 0x40,
        0x07, 0xa4, 0x28, 0xd4, 0x18, 0x48, 0xfe, 0x00,
        "HACKER DEFENDER v0.51 - 0.82b",
 }
};



int RPORT,salir=0,threads=0;
int ip1[4],ip2[4];
CRITICAL_SECTION cs,css,csshell;
FILE *vuln;
char *givemeip(char *ip);
int infectado(int sock, char *ip, int port,int j);

/******************************************************************************/

void checkea(void *larala){

int sock;
int i,j,k=0;
char ip[16];
struct sockaddr_in target_ip;
int puerto=0;
fd_set fds;
u_long tmp=1;
struct timeval tv;
int scanports[]= {1025,80,3389,21,25,7,65536};


 EnterCriticalSection(&css);
 threads++;
 sleep(1);
 LeaveCriticalSection(&css);
 while (givemeip(ip)!=NULL){
  puerto=0;
                k=0;
          while(scanports[k]!=65536) {
              for(j=0;j<3;j++) {
      target_ip.sin_family = AF_INET;
       target_ip.sin_addr.s_addr = inet_addr(ip);
                  target_ip.sin_port = htons(scanports[k]);
           if ((sock=socket(AF_INET,SOCK_STREAM,0)) != -1){
   tmp=1;
   ioctlsocket( sock, FIONBIO, &tmp);
   tv.tv_sec = CONNECT;
   tv.tv_usec = 0;
   FD_ZERO(&fds);
   FD_SET(sock, &fds);
                        connect(sock,(struct sockaddr *)&target_ip, sizeof(target_ip));
     if((i=select(sock+1,0,&fds,0,&tv))>0){
    if (infectado(sock,ip,scanports[k],j)==1)
                                        puerto=65536;
                                        j=3;
   } else j=3;
   closesocket(sock);
   sleep(100);

  }
             }
          k++;
   }
 }
 EnterCriticalSection(&css);
 threads--;
 sleep(1);
 LeaveCriticalSection(&css);
 _endthread();
}
/******************************************************************************/
int infectado(int sock, char *ip, int port, int j){
char cadena[256];
 int recividos=0;
 char buf[10];
 fd_set fds;
 u_long tmp=1;
 struct timeval tv;

 tmp=1;
 ioctlsocket( sock, FIONBIO, &tmp);
 tv.tv_sec = RECV;
 tv.tv_usec = 0;
 FD_ZERO(&fds);
 FD_SET(sock, &fds);

        send(sock,key[j].masterkey,sizeof(key[j].masterkey),0);
 if(select(sock +1, &fds, NULL, NULL, &tv) > 0){
                if (j==0) printf("Checking %s \tport: %i...\n",ip,port);
  recividos=recv (sock, buf, sizeof (buf),0);
  //closesocket(sock);
  if (recividos==1){
   sprintf(cadena," [+] IP: %s port: %i INFECTED with %s\n",ip,port,key[j].banner);
                        printf("%s",cadena);
                        fputs(cadena,vuln);
   return(1);
  }
 }
 return(0);
}


/******************************************************************************/
char *givemeip(char *ip)
{

 EnterCriticalSection(&cs);
 if (ip1[3]!=254)
   ip1[3]++;
 else{
  ip1[2]++;
  ip1[3]=1;
 }
 if (ip1[2]==255){
  ip1[2]++; ip1[1]++;}
 LeaveCriticalSection(&cs);
 if (ip1[2]>ip2[2]) { return(NULL); }
 if (ip1[2]==ip2[2])
  if (ip1[3]>ip2[3]) { return(NULL); }

 sprintf(ip,"%d.%d.%d.%d",ip1[0],ip1[1],ip1[2],ip1[3]);
        if (ip1[3]==1) printf(" + %s\n",ip);
 return(ip);
}
/******************************************************************************/




int main(int argc,char *argv[])
{


 int i,total=NTHREADS;
 WSADATA ws;

 printf(" Remote hxdef Scanner $Revision: 1.0 $\n");
 printf(" atarasco@sia.es http://www.siainternational.com\n\n");
 if (argc!=3) {
  printf(" Usage: rkdscan.exe xx.xx.xx.xx yy.yy.yy.yy\n");
  exit(1);
 }

 if (WSAStartup(MAKEWORD(2,0),&ws)!=0) {
  exit(1);
 }

 sscanf (argv[1], "%d.%d.%d.%d", &ip1[0],&ip1[1],&ip1[2],&ip1[3]);
 sscanf (argv[2], "%d.%d.%d.%d", &ip2[0],&ip2[1],&ip2[2],&ip2[3]);

 for(i=0;i<4;i++){
        if ( (ip1[i]>255) || (ip1[i]<0) ) exit(1);
        if ( (ip2[i]>255) || (ip2[i]<0) ) exit(1);
 }
 InitializeCriticalSection(&cs);
 InitializeCriticalSection(&css);
 InitializeCriticalSection(&csshell);

 printf(" [+] Targets: %s-%s with %i Threads\n",argv[1],argv[2],total);
 vuln=fopen("vuln.txt","a");
 for(i=0;i<total;i++)
        { _beginthread(checkea,8192,(void *)i); sleep(1); }
 while(threads>0) sleep(100);
 fclose(vuln);
 return(1);
}

插件源碼:
# This script was written by Javier Olascoaga <jolascoaga@sia.es>
# (C) SIA (http://www.sia.es)
#
# based on A. Tarasco <atarasco@sia.es> research.
# This script is releases under the GNU GPLv2 license.
#
# Fixes by Tenable:
# - Changed text of description and report.
# - Checked response and added another step in the 
# initialization process to avoid false positives.
# - Fixed bug that caused an empty banner in the report.


desc["english"]= "
This script checks whether the remote host is running the Hacker
Defender backdoor. 

Hacker Defender is a rootkit for Windows. Among other things, it hooks
itself into all open TCP ports on the system, listening for a
specially-crafted packet, and opening a backdoor on that port when
found. This backdoor can be used by malicious users to control the
affected host remotely. 

Solution: Reinstall Windows.
Risk factor: Critical";



if (description) 
{
script_id(15517);
script_version ("$Revision: 1.7 $");

name["english"] = "HACKER defender finder";
script_name(english:name["english"]);

script_description(english:desc["english"]);
summary["english"] = "HACKER defender finder (All versions)";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (c) SIA 2004");
script_family(english:"Backdoors");
script_dependencie("os_fingerprint.nasl");
exit (0);
}

os = get_kb_item("Host/OS/icmp");
if ( os && "Windows" >!< os ) exit(0);

list_ports[0] = 80;
list_ports[1] = 3389;
list_ports[2] = 21;
list_ports[3] = 25;
list_ports[4] = 7;
list_ports[5] = 1025;
list_ports[6] = 443;

max_ports = 6;

hx[0]=raw_string (0x01, 0x1e, 0x3c, 0x6c, 0x6a, 0xff, 0x99, 0xa8,0x34, 0x83, 0x38, 0x24, 0xa1, 0xa4, 0xf2, 0x11,0x5a, 

0xd3, 0x18, 0x8d, 0xbc, 0xc4, 0x3e, 0x40,0x07, 0xa4, 0x28, 0xd4, 0x18, 0x48, 0xfe, 0x00);
hx_banner[0] = string("Hacker Defender v0.51-0.82b");

hx[1]=raw_string(0x01, 0x38, 0x45, 0x69, 0x3a, 0x1f, 0x44, 0x12,0x89, 0x55, 0x7f, 0xaa, 0xc0, 0x9f, 0xee, 0x61,0x3f, 0x9a, 0x7e, 0x84, 

0x32, 0x04, 0x4e, 0x1d,0xd7, 0xe4, 0xa8, 0xc4, 0x48, 0xe8, 0x9e, 0x00);
hx_banner[1] = string("Hacker Defender v0.82-0.83");

hx[2]=raw_string(0x01, 0x9a, 0x8c, 0x66, 0xaf, 0xc0, 0x4a, 0x11,0x9e, 0x3f, 0x40, 0x88, 0x12, 0x2c, 0x3a, 0x4a,0x84, 0x65, 0x38, 0xb0, 

0xb4, 0x08, 0x0b, 0xaf,0xdb, 0xce, 0x02, 0x94, 0x34, 0x5f, 0x22, 0x00);
hx_banner[2] = string("Hacker Defender v0.84-1.0.0");


for (i=0; i <= max_ports; i++) {
# check list port

if (get_port_state(list_ports[i])) 
{
soc = open_sock_tcp (list_ports[i]);
if (soc) 
{
for (j=0;j<3;j++) {
# nb: to understand this, look at the HandlerRoutine in 
# bdcli100.dpr in the Hacker Defender source.
send (socket:soc, data: hx[j]);
data = recv (socket:soc, length:128);
if (data && strlen(data) == 1 && ord(data[0]) == 0xe0)
{
for (t=0; t<20; t++) {
send (socket:soc, data: raw_string(0xe1));
data = recv (socket:soc, length:1, timeout:1);
if (data && strlen(data) == 1 && ord(data[0]) == 0xe2)
{
desc = ereg_replace(
string:desc["english"],
pattern:"This script[^\.]+\.",
replace:string("The remote host is running the ", hx_banner[j], " backdoor.")
);
security_hole(data:desc, port:list_ports[i]);
exit (0);
}
}
}
}
close(soc);
}
}
}

The source code of the plugin above is subject to copyright restrictions. Please check the license of the plugin and/or ask 

its author for licensing details.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲日本欧美天堂| 欧美夫妻性生活| 色呦呦日韩精品| eeuss鲁片一区二区三区| 国内精品免费**视频| 热久久免费视频| 日韩黄色片在线观看| 亚洲一区二区三区视频在线| 亚洲国产一区二区视频| 亚洲成人一二三| 偷拍日韩校园综合在线| 日韩中文字幕麻豆| 激情伊人五月天久久综合| 丝袜a∨在线一区二区三区不卡 | 欧美日韩黄色影视| www欧美成人18+| 日韩免费一区二区三区在线播放| 欧美日韩国产经典色站一区二区三区 | 亚洲图片欧美色图| 亚洲私人影院在线观看| 亚洲欧美在线aaa| 国产精品二区一区二区aⅴ污介绍| 久久先锋影音av鲁色资源| 国产欧美一区二区三区在线看蜜臀 | 91久久一区二区| 91精品国产高清一区二区三区 | 亚洲视频资源在线| 亚洲在线免费播放| 国产高清亚洲一区| 欧美一区二区三区在线观看 | 国产一区二区h| 4438x亚洲最大成人网| 国产精品美女一区二区| 人人精品人人爱| 成av人片一区二区| 日韩写真欧美这视频| 亚洲黄色小视频| 国产成人亚洲综合a∨猫咪| 51精品国自产在线| 日韩美女视频一区二区 | 国产精品黄色在线观看| 久久www免费人成看片高清| 色偷偷成人一区二区三区91| 久久久噜噜噜久噜久久综合| 久久精品国产99久久6| 欧美性xxxxxxxx| 亚洲国产中文字幕在线视频综合| 中文字幕欧美一区| 捆绑调教一区二区三区| 欧美婷婷六月丁香综合色| 日韩欧美国产综合| 日韩影院精彩在线| 欧美肥妇free| 亚洲午夜国产一区99re久久| 91香蕉视频污| 极品少妇一区二区| 久久综合资源网| 国产精品自拍在线| 91免费版pro下载短视频| 日韩一区二区高清| 国产精品私人自拍| 亚欧色一区w666天堂| 欧美xxxx老人做受| 久久久久久久网| 一区二区国产视频| 中文字幕制服丝袜一区二区三区| 亚洲成av人综合在线观看| 日韩三级在线观看| 久久不见久久见免费视频1| 制服丝袜av成人在线看| 蜜臀av一区二区在线免费观看| 一区二区在线观看视频| 日韩午夜电影av| 久久国产综合精品| 欧美区一区二区三区| 久久精品国产99久久6| 极品美女销魂一区二区三区 | 欧美一区二区三区在线观看视频 | 在线观看一区日韩| 亚洲欧洲av另类| 91视视频在线观看入口直接观看www | 久久99国产精品尤物| 成人看片黄a免费看在线| 欧美激情一区二区在线| 久久综合色播五月| 午夜久久久影院| 欧美无砖专区一中文字| 91精品国产91热久久久做人人| 婷婷夜色潮精品综合在线| 日本不卡的三区四区五区| 亚洲风情在线资源站| 在线观看91精品国产入口| 风流少妇一区二区| 日韩一区二区三区四区五区六区| |精品福利一区二区三区| 成人av免费在线观看| 亚洲国产成人tv| 国产精品自在在线| 麻豆成人久久精品二区三区红| 亚洲国产综合91精品麻豆| av成人免费在线| 国产精品911| 亚洲激情男女视频| 国产丝袜欧美中文另类| 国产精品 欧美精品| 激情小说亚洲一区| 精品一区二区三区日韩| 亚洲视频资源在线| 国产精品美女久久久久久久| 成人av午夜影院| 91色婷婷久久久久合中文| 日日摸夜夜添夜夜添亚洲女人| 久久久久久久久久久久久女国产乱 | 高清成人免费视频| 欧美日产在线观看| 欧美一区二区三区小说| 亚洲小说欧美激情另类| 国产午夜精品一区二区| 欧美激情中文不卡| 日本不卡视频在线| 国产精品欧美久久久久无广告| 色狠狠一区二区三区香蕉| 日韩在线一二三区| 色婷婷狠狠综合| 日韩美女视频一区二区| 久久理论电影网| 国产亚洲美州欧州综合国| 高清不卡在线观看| 国产**成人网毛片九色 | 欧美影院精品一区| 亚洲www啪成人一区二区麻豆| 久久这里只有精品视频网| 亚洲同性gay激情无套| 欧美美女直播网站| 麻豆精品国产传媒mv男同| 日本不卡视频一二三区| 免费在线观看一区二区三区| 日本怡春院一区二区| 91在线云播放| 岛国av在线一区| 欧美亚洲国产怡红院影院| 国产传媒一区在线| 日本一区二区三区久久久久久久久不 | 欧美激情一区在线观看| 色婷婷综合在线| 风间由美性色一区二区三区| 日韩在线观看一区二区| 亚洲欧洲日产国码二区| 99久久99精品久久久久久| 亚洲国产精品久久一线不卡| 舔着乳尖日韩一区| 精品第一国产综合精品aⅴ| 精品国产伦一区二区三区免费 | 久久亚洲综合av| 欧美岛国在线观看| 免费视频最近日韩| 亚洲男人电影天堂| 精品久久人人做人人爽| 中文字幕欧美日韩一区| 色婷婷综合久久久中文字幕| 亚洲九九爱视频| 精品久久国产老人久久综合| 日本一区二区三区在线观看| 亚洲精品成人天堂一二三| 午夜精品久久久久久久久久久 | 九九**精品视频免费播放| 日韩视频免费观看高清完整版| 911精品国产一区二区在线| 粉嫩aⅴ一区二区三区四区五区| 成人av资源网站| 久久久国产午夜精品| 国产一区二区在线免费观看| 久久久久久久久久美女| 国产综合久久久久影院| 精品国产免费人成电影在线观看四季| 麻豆成人久久精品二区三区红| 欧美三区免费完整视频在线观看| 欧美韩日一区二区三区| 不卡高清视频专区| 国产色91在线| 99精品视频在线观看| 一区二区三区丝袜| 色视频一区二区| 青青草精品视频| 2欧美一区二区三区在线观看视频| 国产一区二区三区精品视频| 欧美激情一区二区三区蜜桃视频| 日产精品久久久久久久性色| 在线观看国产一区二区| 国产91色综合久久免费分享| 伊人性伊人情综合网| 精品久久国产老人久久综合| 久久久国产精品不卡| 最新国产の精品合集bt伙计| 国产成人免费av在线| 一二三区精品视频| 欧美成人a视频| 成人毛片老司机大片| 一本色道a无线码一区v| 欧美美女一区二区三区|