You are here: hacking technology > hacker course > Content
Hot Articles
Recommend Articles
New Articles
How does the hacker destroy kills the poisonous software
  Add date: 07/08/2008   Publishing date: 07/08/2008   Hits: 65
Total 2 pages, Current page:1, Jump to page:
 

Recently some report of investigation showed that the well-known brand kills the poisonous software to lead only then 20% to new computer virus' Zha Sha, but leaks killing rate actually to reach as high as 80%. Is what reason makes this kind of condition? Is present's virus is too fierce, kills the poisonous software ability to be limited? Today we had a look through the example are anything “puncture blindly” have killed the poisonous software both eyes.

  Hacker name: Yu Qian

  Hacker special skill: Exempts kills the procedure the manufacture

  Uses the tool: MaskPE

  Uses the tool: Super Canadian al organ

  Uses the tool: Private exe Protector

  The hacker confesses: Because the wooden horse software has “black” the characteristic, whenever therefore they are announced soon, will be killed the poisonous software to look up kills. In order to avoid this kind of situation the occurrence, how do I start to study carry on to the hacker procedure exempt kill, let various kill the poisonous software to become in front of them “open the eyes blindly”. How can get up exempts kills the effect

  The present kills the poisonous software to any virus's Zha Sha, is the establishment in has in this virus's condition code foundation. The hacker to let the wooden horse procedure not kill the poisonous software to look up kills, will make the revision or the camouflage through each method to it, also will be carries on exempts kills processing.

  At present common exempts kills the method to have the Canadian shell, the Canadian flower (instruction), the revision condition code, the transformation entrypoint, the entrypoint encryption and so on. Simultaneously the current mainstream killed the poisonous software to use the compound condition code, therefore time were many very inaccessibility through one method exempts kills the effect, by now needed several method coordinations to be able to get up exempts kills the effect. The actual combat procedure exempts kills one, exempts kills from the procedure interior start

  Prepares hacker procedure which we must exempt kill. First carries on encryption processing, movement encryption procedure MaskPE, it is one section revises the PE document automatically the software, may disrupt the procedure original source code, like this can produce the wooden horse which or the virus exempts kills.

  The click “Load File” the button choice exempts kills the procedure, in “Select Information” in tabulation an arbitrary selection item, finally clicks on “Make File” the button, in springs in the window carries on to the encryption document saves in addition then. Second, the flowered instruction confuses kills the poisonous software

  Movement “super Canadian al organ”, this is a section of brand-new Canadian colored procedure. First will serve the end procedure to drive directly to the procedure main contact surface carries on the release, as soon as then under pulls in the tabulation in “the flowered instruction” to choose plants flowers the instruction, after the one-shot “adds the flower” the button, might. Thus, section of colored instructions successfully are increased to the hacker procedure code forefront, these killed the poisonous software from the article article of extraction condition code to be also helpless. Third, adds the shell impediment to kill the poisonous software analysis

 

Other pages: : 1 * 2 * Next>>
Next:The SQL injection revises difficultly to guess the solution MD5

Comment:

Category: Home > hacker course