- UID
- 2198
注册时间2005-6-29
阅读权限255
最后登录1970-1-1
副坛主
  
该用户从未签到
|
发表于 2014-11-28 10:29:33
|
显示全部楼层
方法II: 不适用固定便宜的 ShellCode ...
- 0040396B |. E8 10F70000 CALL Excel汇?00413080
- 00403970 |. 90 NOP
- 00413080 /$ /EB 12 JMP SHORT Excel汇?00413094
- 00413082 |. |6D 73 76 63 72 7>ASCII "msvcrt.dll",0
- 0041308D |. |73 74 72 63 70 7>ASCII "strcpy",0
- 00413094 |> \60 PUSHAD
- 00413095 |. E8 00000000 CALL Excel汇?0041309A
- 0041309A |nbsp; 5B POP EBX ; Excel汇?0041309A
- 0041309B |. 8D43 E8 LEA EAX, DWORD PTR DS:[EBX-18]
- 0041309E |. 50 PUSH EAX ; /FileName = "W媩$?婰$W髁"
- 0041309F |. E8 FB183F76 CALL kernel32.LoadLibraryA ; \LoadLibraryA
- 004130A4 |. 8D4B F3 LEA ECX, DWORD PTR DS:[EBX-D]
- 004130A7 |. 51 PUSH ECX ; /ProcNameOrOrdinal = "MZ?
- 004130A8 |. 50 PUSH EAX ; |hModule = 76948D6E
- 004130A9 |. E8 67ED6975 CALL KERNELBA.GetProcAddress ; \GetProcAddress
- 004130AE FF7424 28 PUSH DWORD PTR SS:[ESP+28]
- 004130B2 FF7424 28 PUSH DWORD PTR SS:[ESP+28]
- 004130B6 |. FFD0 CALL NEAR EAX ; MSVCRT.strcpy
- 004130B8 |. 61 POPAD
- 004130B9 83C4 08 ADD ESP, 8
- 004130BC 33C0 XOR EAX, EAX ; MSVCRT.strcpy
- 004130BE C3 RETN
复制代码
EB 12 6D 73 76 63 72 74 2E 64 6C 6C 00 73 74 72 63 70 79 00 60 E8 00 00 00 00 5B 8D 43 E8 50 E8
FB 18 3F 76 8D 4B F3 51 50 E8 67 ED 69 75 FF 74 24 28 FF 74 24 28 FF D0 61 83 C4 08 33 C0 C3
|
|