首页
社区
课程
招聘
[下载]Dream Of Every Reverser
发表于: 2007-5-31 18:39 4039

[下载]Dream Of Every Reverser

2007-5-31 18:39
4039
see more:1c2K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7X3!0C8L8#2)9J5k6i4m8Z5k6h3q4J5L8r3g2K6M7#2)9J5k6h3!0J5k6#2)9J5c8X3c8G2k6i4u0Q4x3X3g2Z5N6r3#2D9

Dream Of Every Reverser is ring3 memory tracing project which is currently in stable phase so that's why it is released anyway.
Features:
- Stealth trace of memory access on given range
- speed
- PAE and normal addressing mode supported
Limitations:
- no win2k3 support
- no MP support
- systems running KAV not supported, that shit hooks needed code in ntoskrnl.exe so tracer won't work with it!!



Dream Of Every Reverser

deroko of ARTeam

Usage:

- use loader.exe to load tracer engine, after that put tr1.exe in folder
of your target, rename target to unpackme.exe and run tr1.exe, and watch
output in DebugView...

Theory and coding

To make working r0 memory tracer some rules must be defined.

- r3 memory is pagable
- no way to lock that memory
- SwapContext hook is required

Ring3 memory is pagable so there are 2 ways of controling access to it.
One of them is when memory is paged out, in that case P bit in pte is
set to 0. When such page is being accessed IA32 generates page fault
so access to this page can be tracked like that.

When page is in memory P bit can't be used track access to memory in r3.
This is place where U/S bit is used to mark present pages as supervisor,
so any access from r3 will cause page fault. Only task here is to such
pages set to user and to return from handler.

All of this is performed by hook of int 0e handler.

Role of SwapContext is to clear and set breaks on memory which is not
paged out. During execution memory can be paged out/in. So to keep
everything under control on execution of traced process breaks are set.

- win2k3 is not supported
- MP system is not supported
- systems running Kaspersky shit and other shity AVs which patch your
system more then any known rootkit are not compatible with this
tracer. Don't like this? I don't care

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

上传的附件:
收藏
免费 1
支持
分享
最新回复 (6)
雪    币: 817
活跃值: (1927)
能力值: ( LV12,RANK:2670 )
在线值:
发帖
回帖
粉丝
2
deroko of ARTeam
2007-5-31 19:24
0
雪    币: 494
活跃值: (629)
能力值: ( LV9,RANK:1210 )
在线值:
发帖
回帖
粉丝
3
不错,可惜没有源码,顺便问问林版有没有Shadow Walker的源码?
2007-5-31 19:25
0
雪    币: 106803
活跃值: (202484)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
4
use IDA to rip the code .... 



as i kown ,Shadow Walker no open the full source......Shadow Walker's code is base on FU rootkit...


----[ 3.4 - Proof Of Concept Implementation                                
      
Our current implementation uses a modified FU rootkit and a new page fault 
handler called Shadow Walker. Since FU alters kernel data structures to    
hide processes and does not utilize any code hooks, we only had to be      
concerned with hiding the FU driver in memory. The kernel accounts for     
every process running on the system by storing an object called an EPROCESS 
block for each process in an internal linked list. FU disconnects the      
process it wants to hide from this linked list. 
      
------[ 3.4.a - Modified FU Rootkit   
 

see more.

english:b2bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8Z5M7X3q4U0K9#2)9J5k6h3!0J5k6#2)9J5c8X3q4J5j5$3S2A6N6X3g2K6i4K6u0r3y4U0y4Q4x3V1k6H3y4U0y4Q4x3X3b7H3P5o6l9^5i4K6g2X3f1X3q4A6M7$3W2F1k6#2)9#2k6W2c8Z5k6g2)9#2k6V1u0S2M7W2)9#2k6V1k6G2M7W2)9#2k6W2N6A6L8X3c8G2N6%4y4Q4y4h3k6d9L8$3!0@1K9$3W2@1i4K6g2X3c8r3g2@1k6h3y4@1K9h3!0F1i4K6u0W2N6s2S2@1
chinese:21eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4S2X3L8$3y4#2M7#2)9J5k6h3&6W2N6q4)9J5c8X3q4J5N6r3W2U0L8r3g2K6i4K6u0r3x3U0l9H3y4e0l9^5i4K6u0r3z5o6p5J5i4K6u0W2K9s2c8E0L8l9`.`.
2007-5-31 19:57
0
雪    币: 233
活跃值: (10)
能力值: ( LV6,RANK:90 )
在线值:
发帖
回帖
粉丝
5
THANKS
LIN AND DEROKO  
2007-5-31 20:34
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
6
看>看~~~~~~~~~~~~~
2007-5-31 22:09
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
7
看看再说呵呵。
2007-6-6 11:38
0
游客
登录 | 注册 方可回帖
返回