收藏 分享(赏)

ExeCryptor 2.0.x - 2.3.x OEP finder v0.2.txt

上传人:a****2 文档编号:3398584 上传时间:2024-04-28 格式:TXT 页数:3 大小:3.10KB
下载 相关 举报
ExeCryptor 2.0.x - 2.3.x OEP finder v0.2.txt_第1页
第1页 / 共3页
ExeCryptor 2.0.x - 2.3.x OEP finder v0.2.txt_第2页
第2页 / 共3页
ExeCryptor 2.0.x - 2.3.x OEP finder v0.2.txt_第3页
第3页 / 共3页
亲,该文档总共3页,全部预览完了,如果喜欢就下载吧!
资源描述

1、/*=ExeCryptor 2.0.x - 2.3.x OEP finder script by HAGGAR=Features:- Script bypass all anti-debug tricks in ExeCryptor;- Script attempt to find OEP of protected file or, insuch case, STOLEN_OEP_CODE start address.Instructions:1. You need to have NT based operating system;2. Configure OllyDbg in Debugg

2、ing Options-Events toMake first pause at - System breakpoint;3. Ignore all exceptions and add to custom this oneC000001E (INVALID LOCK SEQUENCE)4. Remove or disable all plugins which purpose is to hideOllyDbg from protecors. ExeCryptor detects modifiedimports and by that most such plugins are detect

3、ed.5. Now load target in OllyDbg. Remove all breakpoints(hardware, memory, software). OllyDbg sets one bpon OEP by default and ExeCryptor checks that. HitAlt+B to see is that breakpoint listed there. Ifit is, remove it.6. Now, run this script .=*/var bak_eipvar bak_1var bak_2var EPvar addrvar tempva

4、r proclog log -log ExeCryptor 2.0.x - 2.3.x OEP finder script by HAGGARlog -/- Patch what can be patched -gpa FindWindowA,user32.dllmov $RESULT,#8BFF5533C05DC20800#gpa OutputDebugStringA,kernel32.dllmov $RESULT,#8BFF5533C05DC20400#gpa ReadProcessMemory,kernel32.dllmov $RESULT,#8BFF5533C05DC21400#gpa

5、 CreateThread,kernel32.dllmov $RESULT,#8BFF555DC21800#gpa CloseHandle,kernel32.dllmov $RESULT,#8BFF555DC20400#gpa CheckRemoteDebuggerPresent,kernel32.dllmov $RESULT,#8BFF5533C05DC20800#gpa KiRaiseUserExceptionDispatcher,ntdll.dllmov $RESULT,#C390909090#/- Find block with process information -mov bak

6、_eip,eip /Backup current EIP (SYSTEM_BP).mov bak_1,eip /Backup original bytes at SYSTEM_BP.mov bak_2,bak_1add bak_2,4mov bak_1,bak_1mov bak_2,bak_2mov eip,#5064A11800000058# /Little hack to obtain data block.stistimov addr,eax /Take pointer.stimov eip,bak_eip /Restore original EIP.mov eip,bak_1 /Res

7、tore original bytes.add eip,4mov eip,bak_2sub eip,4add addr,30mov addr,addr/- Erase debug bits -mov temp,addr /BeingDebuggedand temp,0ff00ffffmov addr,tempmov temp,addr /HeapFlagadd temp,18mov temp,tempadd temp,10mov temp,0mov temp,addr /NtGlobalFlagadd temp,68mov temp,0/- Erase EP bp that OllyDbg s

8、ets by default -mov temp,addradd temp,8mov temp,temp /Module base.log log Module base of protected file is:log tempadd temp,3Cadd temp,temp /PE signature offset.sub temp,3Cadd temp,28mov temp,temp /EP offset.add addr,8add temp,addr /Virtual offset.sub addr,8 log log EntryPoint of protected file is:log tempbp temp /Set bp.bc temp /Erase bp. That erases default OllyDbg bp on EP.retERROR:msg ERROR! Error in my script (haggar)!ret

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 教育教学 > 教案课件

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2