能力值:
( LV2,RANK:10 )
|
-
-
2 楼
据我所知windows2000有了比较多的安全审核机制,
以前CIH病毒在Windows98中获取ring0权限的办法已经不能用了.(但在wince下可以用,我试过)
这里有篇文章:
[EMAIL=027K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3W2F1k6X3!0K6k6h3y4#2M7X3W2@1P5g2)9J5k6h3!0J5k6#2)9J5k6h3y4F1i4K6u0r3j5i4u0@1K9h3y4D9k6g2)9J5c8X3!0K6M7$3g2U0i4K6u0r3L8Y4b7J5x3o6l9H3i4K6u0r3x3U0t1#2z5e0g2Q4x3X3g2Z5N6r3#2D9i4K6g2p5g2$3W2F1k6r3!0%4M7H3`.`. 2000下不用驱动的Ring0代码实现[/EMAIL]
另外:
Kendiv翻译的《Undocumented Windows 2000 Secrets》也提到过相关内容.
[EMAIL=《Undocumented Windows 2000 Secrets》]Kendiv的Blog[/EMAIL]
|
能力值:
( LV2,RANK:10 )
|
-
-
3 楼
谢谢了朋友。 哎. 不能用调用门和中断门好可惜哦。
这么底层的方法都不行了。 可惜了。
|
能力值:
( LV8,RANK:130 )
|
-
-
4 楼
Entering the kernel without a driver and getting interrupt information from APIC:
32cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4G2k6r3g2H3M7X3!0B7k6h3y4@1i4K6u0W2j5$3!0E0i4K6u0r3M7%4W2K6N6r3g2E0i4K6u0r3M7$3!0$3K9h3g2@1i4K6g2X3K9$3g2J5L8X3g2D9i4K6g2X3K9r3q4U0K9#2)9J5k6h3q4K6M7l9`.`.
干吗不多做做winXP/2003下的事情呢?win9x/me根本就没有多少安全保护机制,连微软都不支持它们了。去b07K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4u0G2L8%4c8C8K9i4c8Q4x3X3g2U0L8$3#2Q4c8e0N6Q4z5f1y4Q4z5p5u0Q4c8e0N6Q4z5f1y4Q4z5p5u0Q4c8f1k6Q4b7V1y4Q4z5p5y4Q4c8e0S2Q4b7V1k6Q4z5f1g2Z5j5h3y4C8k6r3g2X3k6h3&6V1k6i4u0Q4c8e0N6Q4z5f1q4Q4z5o6c8Q4c8e0c8Q4b7V1c8Q4z5f1y4Q4c8e0S2Q4z5o6m8Q4z5o6g2Q4c8e0W2Q4z5o6y4Q4b7V1c8Q4c8e0k6Q4b7U0u0Q4b7e0q4Q4c8e0k6Q4z5f1y4Q4z5o6W2Q4c8e0g2Q4z5o6g2Q4b7U0c8Q4c8e0S2Q4b7U0k6Q4b7e0y4Q4c8e0g2Q4b7V1y4Q4z5o6m8Q4c8e0g2Q4z5p5k6Q4z5e0q4%4K9h3^5&6P5q4!0q4y4q4!0n7z5q4)9^5b7W2!0q4y4#2)9&6b7g2)9^5y4s2u0G2L8%4c8C8K9i4c8Q4c8f1k6Q4b7V1y4Q4z5p5y4Q4c8e0c8Q4b7U0S2Q4z5p5c8Q4c8e0g2Q4z5o6m8Q4b7V1y4Q4c8e0g2Q4b7V1g2Q4z5e0N6Q4c8e0S2Q4b7U0c8Q4b7U0W2Q4c8e0W2Q4z5o6u0Q4b7e0y4Q4c8e0c8Q4b7U0S2Q4b7f1q4Q4c8e0g2Q4z5p5q4Q4b7U0u0Q4c8e0y4Q4z5o6m8Q4z5o6t1`.
|
|
|