kd> dt nt!_RTL_USER_PROCESS_PARAMETERS +0x000 MaximumLength : Uint4B +0x004 Length : Uint4B +0x008 Flags : Uint4B +0x00c DebugFlags : Uint4B +0x010 ConsoleHandle : Ptr32 Void +0x014 ConsoleFlags : Uint4B +0x018 StandardInput : Ptr32 Void +0x01c StandardOutput : Ptr32 Void +0x020 StandardError : Ptr32 Void +0x024 CurrentDirectory : _CURDIR +0x030 DllPath : _UNICODE_STRING +0x038 ImagePathName : _..
Someone had been asking how to hook ZwShutdownSystem, the only problem being the function is exported by ntdll, not ntoskrnl. metro_mystery was helpful in providing the table entry number for the call, but unfortunately, the entry number would have to have been hardcoded into the driver. Fortunately, getting the id dynamically from a user land component is easy, simply do it the same way we alwa..
/*++ Routine Description: This routine creates and initializes a process object. It implements the foundation for NtCreateProcess and for system initialization process creation. Arguments: ProcessHandle - Returns the handle for the new process. DesiredAccess - Supplies the desired access modes to the new process. ObjectAttributes - Supplies the object attributes of the new process. ParentProcess..
/*++ Routine Description: This routine creates a system process object. A system process has an address space that is initialized to an empty address space that maps the system. The process inherits its access token and other attributes from the initial system process. The process is created with an empty handle table. Arguments: ProcessHandle - Returns the handle for the new process. DesiredAcc..
ExAcquireFastMutexUnsafe ExAcquireRundownProtection ExAcquireRundownProtectionEx ExInitializeRundownProtection ExInterlockedAddLargeStatistic ExInterlockedCompareExchange64 ExInterlockedFlushSList ExInterlockedPopEntrySList ExInterlockedPushEntrySList ExReInitializeRundownProtection ExReleaseFastMutexUnsafe ExReleaseResourceLite ExReleaseRundownProtection ExReleaseRundownProtectionEx ExRundownCo..
A more stable way to locate real KiServiceTable Tan Chew Keong in his Win2K/XP SDT Restore 0.1 uses a simple way to find changed SDT entries - he just compares SDT from memory with SDT from ntoskrnl.exe file, assuming that KeServiceDescriptorTable.Base is not changed. If it is, Tan's code that locates KiServiceTable on disk will fail when KeServiceDescriptorTable.Base points somewhere outside th..
Open Source VMware가 나왔군. 소스가지 공개가 되고... 분석을 위해 Snapshot 간에 비교를 하도록 구현을 한다면 루트킷 같이 까다로운 애들을 분석하는 업무가 진짜 쉬워질텐데... ---------------------------------------------------- URL : http://www.virtualbox.org/ SVN : http://virtualbox.org/svn/vbox/trunk/ 기능은 좀 더 확인을 해봐야 알겠지만. 무엇 보다도 소스가 공개된다는 것이 가장 흥미롭다.
원문(OSR)의 글을 요약, 이해 정리한 글이다. 아래의 4가지 시나리오를 통해 NtXxx 함수와 ZwXxx함수에 대해 알아보자. UserMode에서 NtXxx(NTDLL.DLL) 함수 호출하기 UserMode에서 ZwXxx(NTDLL.DLL) 함수 호출하기 KernelMode에서 NtXxx(NTOSKRNL.EXE) 함수 호출하기 KernelMode에서 ZwXxx(NTOSKRNL.EXE) 함수 호출하기 Calling From User Mode NTDLL.DLL에서 NtXxx의 함수 NtReadFile을 Windbg에서 U 명령어를 통해 disassemble 한 결과는 아래와 같다. 0: kd> u ntdll!NtReadFile ntdll!NtReadFile: 77f761e8 b8b7000000 mov e..
ArcaVir AVAST AVG CA ClamWin Dr.Web F-Prot Ikarus Kaspersky McAfee Corporate McAfee Home NOD32 Norman TrendMicro OfficeScan TrendMicro PC-Cillin Panda Titanium Symantec Corporate UNA
Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through forged magic byte. AUTHOR: Andrey Bayora (www.securityelf.org) For more details, screenshots and examples please read my article "The Magic of magic byte" at www.securityelf.org . In addition, you will find a sample “triple headed” program which has 3 different 'execution entry points', depending on the extension of the ..
- Total
- Today
- Yesterday
- 지루박멸연구센타
- 열정의 힘을 믿는다
- Le4rN TO Cr4cK
- 디버깅에관한모든것(DebugLab)
- sysinternals
- FoundStone
- hashtab
- 보안-coderant
- 디바이스드라이버 개발자 포럼
- dualpage.muz.ro
- osronline.com - 드라이버 관련 정보 사이트
- NtInternals - NativeAPI Refere…
- pcthreat - spyware 정보 제공
- rootkit.com - 루트킷 관련 정보
- www.ntinternals.net
- WINE CrossRef. - source.winehq…
- tuts4you
- hex-rays
- idapalace
- idefense
- immunityinc
- threatexpert
- hdp.null2root.org
- www.crackstore.com
- crackmes.de
- www.who.is
- www.cracklab.ru
- community.reverse-engineering.…
- video.reverse-engineering.net
- SnD
- 클레이 키위
- reversengineering.wordpress.co…
- www.openrce.org
- www.woodmann.com
- PEID.Plusins.BobSoft
- roxik.com/pictaps/
- regexlib.com
- spyware-browser.com
- www.usboffice.kr
- regulator
- www.txt2re.com
- ietab.mozdev.org
- zesrever.xstone.org
- www.heaventools.com/PE-file-he…
- www.heaventools.com
- www.innomp3.com
- 울지않는벌새
- exetools.com-forum
- exetools.com
- utf8 conv
- robtex - IP trace
- onsamehost - same IP sites
- JpopSuki
- jsunpack.jeek.org
- wepawet.iseclab.org
- www.jswiff.com
- www.hackeroo.com
- winesearcher.co.kr
- khpga.org
- malwareurl.com
- anubis.iseclab.org
- www.crummy.com-eautifulSoup
- malwarebytes.org/forums
- bbs.janmeng.com
- blackip.ustc.edu.cn
- eureka.cyber-ta.org
- exploit-db.com
- INVOICE
- 자동트래이딩
- 레고랜드
- PIR
- ROA
- hai
- 주식
- 군함도
- logrotate
- 매매가격지수
- systemd
- 미국주식
- 주택구매력지수
- Pivot
- 실시간트래이딩
- ubuntu
- 주식트래이딩
- 피봇
- 시스템트래이딩
- 사회간접자본
- O365
- CriticalSection
- SBI저축은행
- 공공인프라
- 다올저축은행
- ElasticSearch
- 신한저축은행
- 전세매매지수
- 맥쿼리인프라
- ChatGPT
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |