• <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>

            S.l.e!ep.¢%

            像打了激速一樣,以四倍的速度運(yùn)轉(zhuǎn),開心的工作
            簡單、開放、平等的公司文化;尊重個性、自由與個人價值;
            posts - 1098, comments - 335, trackbacks - 0, articles - 1
              C++博客 :: 首頁 :: 新隨筆 :: 聯(lián)系 :: 聚合  :: 管理

            監(jiān)控Explorer的進(jìn)程創(chuàng)建問題

            上一篇 / 下一篇 ?2008-08-23 14:50:57

            近日筆者收到某網(wǎng)友的信件稱,“為何自己寫的監(jiān)控 Explorer進(jìn)程代碼運(yùn)行后,系統(tǒng)會崩潰。”現(xiàn)筆者就這一問題,拿出與用戶共同探討。NT 下的 Explorer 通過 CreateProcessInternalW建立,R3的控制權(quán)。代碼如下:

            ????? bInheritHandles,
              DWORD?dwCreationFlags,
              LPVOID?lpEnvironment,
              LPCWSTR?lpCurrentDirectory,
              LPSTARTUPINFOW?lpStartupInfo,
              LPPROCESS_INFORMATION?lpProcessInformation,
              PHANDLE?hNewToken);
              int?APIENTRY?DllMain(HINSTANCE?hInstance,?DWORD?dwReason,?LPVOID?lpReserved)
              {
              UNREFERENCED_PARAMETER(lpReserved);
              if?(dwReason?==?DLL_PROCESS_ATTACH)
              {
              ExampleJmp();
              }
              else?if?(dwReason?==?DLL_PROCESS_DETACH)
              {
              SetHookOff();
              }
              return?1;
              }
              void?HookOneAPI(LPCTSTR?ModuleName,?LPCTSTR?ApiName,?FARPROC?lpNewFunc)
              {
              BYTE?str[8]?=?{?0x0B8,?0x0,?0x0,?0x40,?0x0,?0x0FF,?0x0E0,0};?//?mov?eax,addr?jmp?eax
              memcpy(m_NewFunc,str,8);
              m_lpHookFunc?=?GetProcAddress(GetModuleHandle(ModuleName),ApiName);
              m_hProc?=?GetCurrentProcess();
              memcpy(m_OldFunc,(char?*)m_lpHookFunc,8);
              *(DWORD?*)(?m_NewFunc?+?1?)?=?(DWORD)lpNewFunc;
              }
              void?WINAPI?SetHookOn()
              {
              MEMORY_BASIC_INFORMATION?mbi;
              VirtualQuery(m_lpHookFunc,&mbi,sizeof(mbi));
              VirtualProtect(m_lpHookFunc,sizeof(DWORD),PAGE_READWRITE,0);
              DWORD?dwOldFlag;
              WriteProcessMemory(m_hProc,?(void?*)m_lpHookFunc,
              (void?*)m_NewFunc,?8,&dwOldFlag);
              }
              void?WINAPI?SetHookOff()
              {
              DWORD?dwOldFlag;
              WriteProcessMemory(m_hProc,?(void?*)m_lpHookFunc,
              (void?*)m_OldFunc,?8,?&dwOldFlag);
              }
              BOOL?WINAPI?MyCreateProcess(HANDLE?hToken,
              LPCWSTR?lpApplicationName,
              LPWSTR?lpCommandLine,
              LPSECURITY_ATTRIBUTES?lpProcessAttributes,
              LPSECURITY_ATTRIBUTES?lpThreadAttributes,
              BOOL?bInheritHandles,
              DWORD?dwCreationFlags,
              LPVOID?lpEnvironment,
              LPCWSTR?lpCurrentDirectory,
              LPSTARTUPINFOW?lpStartupInfo,
              LPPROCESS_INFORMATION?lpProcessInformation,
              PHANDLE?hNewToken)
              {
              BOOL?BReturn=TRUE;
              SetHookOff();
              CreateProcessHH?CreateProcessHHH=(CreateProcessHH)GetProcAddress(GetModuleHandle("Kernel32.dll"),"CreateProcessInternalW");
              BReturn=CreateProcessHHH(hToken,lpApplicationName,lpCommandLine,lpProcessAttributes
              ,lpThreadAttributes,bInheritHandles,dwCreationFlags,lpEnvironment,lpCurrentDirectory,
              lpStartupInfo,lpProcessInformation,hNewToken);
              SetHookOn();
              return?BReturn;
              }
              BOOL?UpPrivilege(HANDLE?hprocess,LPCTSTR?lpname)?//提升進(jìn)程權(quán)限?debug
              {
              HANDLE?hToken;
              TOKEN_PRIVILEGES?Privileges;
              LUID?luid;
              OpenProcessToken(hprocess,TOKEN_ADJUST_PRIVILEGES,&hToken);
              Privileges.PrivilegeCount=1;
              LookupPrivilegeValue(NULL,lpname,&luid);
              Privileges.Privileges[0].Luid=luid;
              Privileges.Privileges[0].Attributes=SE_PRIVILEGE_ENABLED;
              if(AdjustTokenPrivileges(hToken,FALSE,&Privileges,NULL,NULL,NULL)!=0)
              return?TRUE;
              return?FALSE;
              }
              void?WINAPI?ExampleJmp()
              {
              char?privilege[]=SE_DEBUG_NAME;
              HANDLE?hprocess;
              hprocess=GetCurrentProcess();
              if(!UpPrivilege(hprocess,privilege))?//開始提權(quán)
              {
              exit(-1);
              }
              HookOneAPI("Kernel32.dll","CreateProcessInternalW",(FARPROC)MyCreateProcess);
              SetHookOn();
              }

            ????? 歡迎大家把自己的意見和代碼公布出來,IT專家網(wǎng)將給您和您的團(tuán)隊提供更多展現(xiàn)自己的舞臺!

            久久久久高潮毛片免费全部播放| 亚洲国产成人久久精品动漫| 蜜桃麻豆WWW久久囤产精品| 伊人久久五月天| 精品久久777| 人妻无码αv中文字幕久久琪琪布| 久久精品无码一区二区无码| 大蕉久久伊人中文字幕| 亚洲色大成网站www久久九| 人人狠狠综合久久亚洲88| 99久久精品免费看国产一区二区三区 | 人妻无码久久精品| 99久久人妻无码精品系列蜜桃| 久久人人超碰精品CAOPOREN | a级毛片无码兔费真人久久| 色诱久久久久综合网ywww| 久久国产综合精品五月天| 久久精品国产精品国产精品污| 欧美亚洲国产精品久久高清| 国内精品久久久久久久coent| 久久精品天天中文字幕人妻| 久久人妻无码中文字幕| 日韩va亚洲va欧美va久久| 99久久国产主播综合精品| www性久久久com| 99国产精品久久久久久久成人热| 久久天天躁狠狠躁夜夜躁2014| 久久天天躁狠狠躁夜夜2020| 久久国产视频99电影| 91精品国产91久久久久久| 久久一日本道色综合久久| 人妻精品久久久久中文字幕69| 亚洲午夜久久久久久久久电影网| 国产成人精品久久| 亚洲精品乱码久久久久久蜜桃图片 | 久久妇女高潮几次MBA| 亚洲国产成人精品女人久久久 | 亚洲香蕉网久久综合影视| 久久强奷乱码老熟女网站| 婷婷久久综合九色综合九七| 久久精品国产亚洲一区二区三区|