ImageVerifierCode 换一换
格式:TXT , 页数:5 ,大小:4.22KB ,
资源ID:3398590      下载积分:2 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.wnwk.com/docdown/3398590.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Armadillo 3.xx - 5.xx Detach from Client v0.2.txt)为本站会员(a****2)主动上传,蜗牛文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知蜗牛文库(发送邮件至admin@wnwk.com或直接QQ联系客服),我们立即给予删除!

Armadillo 3.xx - 5.xx Detach from Client v0.2.txt

1、/*Detach Father from Child+Patch Crypto Process+CopyMem2Credits go to Ricardo, Hippu, Tenketsu and VolX for thier scripts and ideas.*/Variable Declarationsvar WaitForDebugEventvar WriteProcessMemoryvar DebugActiveProcessStopvar PEHeaderBasevar ImageBasevar CodeBeginvar DataBeginvar ProcessDebugEvent

2、var ProcessBuffervar ChildProcessIDvar ChildOEPvar OEPBytesvar OEPOffset1var OEPOffset2var OEPOffset3var CryptoProcessvar Addressvar Buffervar Patch1var Patch2var temp1/Setupdbhmsg Clear all breakpoints, and Set Ollydbg to pass all exceptions,rnand add custom exceptions C0000005, C000001D, C000001E

3、and C0000096, press OK to continue.gpa WaitForDebugEvent, kernel32.dllmov WaitForDebugEvent, $RESULTgpa WriteProcessMemory, kernel32.dllmov WriteProcessMemory, $RESULTgpa DebugActiveProcessStop, kernel32.dllmov DebugActiveProcessStop, $RESULT/Get Section Basesgmi eip, MODULEBASEmov ImageBase, $RESUL

4、Tmov PEHeaderBase, ImageBaseadd PEHeaderBase, 3C / Offset to PE signaturemov PEHeaderBase, PEHeaderBaseadd PEHeaderBase, ImageBasemov CodeBegin, PEHeaderBaseadd CodeBegin, 104 / Offset to 1st Section Virtual Addressmov CodeBegin, CodeBeginadd CodeBegin, ImageBasemov DataBegin, PEHeaderBase / Offset

5、to 2nd Section Virtual Addressadd DataBegin, 12Cmov DataBegin, DataBeginadd DataBegin, ImageBaselog CodeBeginlog DataBegin/ Begin Unpackingbphws WriteProcessMemory, xerunbphwc WriteProcessMemorybphws WaitForDebugEvent, xerun/ Get Information at WaitForDebugEventbphwc WaitForDebugEventmov ProcessDebu

6、gEvent, espadd ProcessDebugEvent, 04mov ProcessDebugEvent, ProcessDebugEventmov OEPOffset1, ProcessDebugEventadd OEPOffset1, 18mov OEPOffset2, ProcessDebugEventadd OEPOffset2, 24mov OEPOffset3, ProcessDebugEventadd OEPOffset3, 28log ProcessDebugEventlog OEPOffset1log OEPOffset2log OEPOffset3/ Get Ch

7、ild Process ID and Child OEPbphws WriteProcessMemory, xerunbphwc WriteProcessMemorymov ChildProcessID, ProcessDebugEventadd ChildProcessID, 04mov ChildProcessID, ChildProcessIDmov ChildOEP, OEPOffset1/ Get Stack Infomov Address, espadd Address, 08mov Address, Addresslog Addressmov Buffer, espadd Buf

8、fer, 0Cmov Buffer, Bufferlog Buffer/ Patch OEP of Childmov temp1, ChildOEPsub temp1, Addressadd temp1, Buffermov OEPBytes, temp1log OEP of Child Process was patched to EBFElog ChildOEPlog ChildProcessIDmov temp1, #EBFE#/ Find and patch Crypto Procrtrstigmemi eip, MEMORYBASEmov CryptoProcess, $RESULT

9、find CryptoProcess, #8B048A50E8?83C40C# / mov eax, dword ptr ds:edx+ecx*4 push eax call XXXXXXXX add esp,0ccmp $RESULT, 0je Error1mov CryptoProcess, $RESULTadd CryptoProcess, 04mov CryptoProcess, #9090909090#log CryptoProcesslog Crypto Process was nopped.eval Successfully Patched OEP = ChildOEP of C

10、hild Process (PID= ChildProcessID) from OEPBytes (Inverted) to EBFE.rnrnCheck log for more info. Press OK to continue. msg $RESULT/ Patch CopyMemII and WaitForDebugEventbphws WaitForDebugEvent, xerunbphwc WaitForDebugEventmov Patch1, espsub Patch1, 12log Patch1mov Patch1, #90909090909090909090909090

11、9090909090#add Patch1, 14eval jmp CodeBeginasm Patch1, $RESULTadd Patch1, 05eval nopasm Patch1, $RESULTmov Patch2, CodeBegineval add dword OEPOffset1,1000asm Patch2, $RESULTadd Patch2, 0Aeval add dword OEPOffset2,1000asm Patch2, $RESULTadd Patch2, 0Aeval add dword OEPOffset3,1000asm Patch2, $RESULTa

12、dd Patch2, 0Aeval cmp dword OEPOffset3,DataBeginasm Patch2, $RESULTadd Patch2, 0Aeval jnz Patch1asm Patch2, $RESULTadd Patch2, 06eval push ChildProcessIDasm Patch2, $RESULTadd Patch2, 05eval call DebugActiveProcessStopasm Patch2, $RESULTadd Patch2, 05eval nopasm Patch2, $RESULTsub CodeBegin, 1000mov OEPOffset1, CodeBeginmov OEPOffset2, CodeBeginmov OEPOffset3, CodeBegin/go espmov eip, espbphws Patch2, xerunbphwc Patch2msg Script Completed Successfully! More Info in Log. Have fun!jmp EndError1:msg Cant find Crypto Process call!End:ret

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2