Method for closing the program in Win2000XP2003

xiaoxiao2021-03-06  42

Only for more than 2000 systems, don't ask me, don't ask me, 4 years didn't work :)

There are generally four ways:

1) DLL method

The program is rewritten as the DLL structure, which is running on Explorer.exe.

Benefits: No process entity, ordinary process view invalid

Disadvantages: You can call Explorer.exe Unload Your DLL, huh, you will be re-enabled, you need to re-rely on your DLL at that time.

Improvement: Using Debug permission to hack, haha, the safety factor is much higher, Winlogon is dead, you also crash

Lysoft Home http://ly.activepower.net/projects/no ctrl alt del.ra is an example of a DLL-relying method, modifying

2) API HOOK method

What is the essence of a shutdown? TerminateProcess's API!

As long as your application.title: = '' does not appear on the first page of the task manager

The second page will appear, but not afraid, I hook TerminateProcess can guarantee security.

TerminateProcess can hook? Yes, but hook is useless, handle is unknown

So in essence, hook is openprocess, as long as it is my process, I refuse to open.

Benefits: Not afraid that you can see it, you can't get me

Disadvantages: The command line method under cmd hook is not

Improvement: You can Hook System Services can be, but unfortunately difficult, need to write drive

Lysoft Home http://ly.activepower.net/projects/api hook.rar is an example of the API Hook method, which is available

3) NT kernel modification method

Modify the ActiveProcessLink list on the NT system kernel object PslineDModuleList to "miss" on the system, but implement this feature requires driving support, no drive method can only fit XP / 2003, because NT5.1 The ZWSystemDebugControl API can support kernel access

Benefits: I can't see the process.

Disadvantages: Excessive difficulty, can still be seen with kernel tools, many rootkit Trojans use this method

Improvement: Almost the ultimate Dafa, there is no other good way.

Lysoft homepage

http://ly.activepower.net/projects/ntlowlevel.exe is a demos

Key code is as follows

Function hideprocess: bolean;

Label ERR;

VAR

Eprocess: DWORD;

HPM, FLINK, BLINK: Cardinal

Begin

Result: = FALSE;

Eprocess: = getcurrenteprocess;

IF EPROCESS <1 THEN EXIT;

IF not ReadvirtualMemory (EPRocess $ 88, @flink, 4) THEN EXIT;

IF not ReadvirtualMemory (Eprocess $ 8c, @BLINK, 4) THEN EXIT;

IF not WritevirtualMemory (Flink 4, @BLINK, 4) THEN EXIT;

IF not WritevirtualMemory (Blink, @flink, 4)..

END;

Don't ask why, you need NTDDK knowledge to understand :)

4) Remote thread method

There is no entity, there is no process, no DLL, only code

Turn the code directly into the process space VirtualaLalk, run with CreateremoteThread,

Benefits: No visible entity, the strongest concealedness

Disadvantages: Suitable for simple code, complex difficult to ensure its reliability and stability, the most love of viruses

Improved: No need?

This is not demonstrated, huh, :)

Inject a certain process space to involve a series of viral operations such as API positioning, running on the other party

Simple code, complex features are very unsuitable, the general procedures are not suitable at all, so this method is not recommended unless the virus is written, because the adjustment is difficult

Lysoft http://lysoft.7u7.net

转载请注明原文地址:https://www.9cbs.com/read-60300.html

New Post(0)