📄 783.html
字号:
<br />
return STATUS_SUCCESS;<br />
}<br />
<br />
上面的代码从驱动层加载NTDLL,再从输出表中找出函数地址,mov eax,[ID]对应的b8后面的字就是索引号,其实跟前一个代码作用是相似的,<br />
只是驱动层没有LoadLibrary,只能这样解决了。将上面的代码整合起来就比较完善了,大家看着改吧。这里顺便把2003中的服务描述表发出来,希望对大家有帮助:<br />
<br />
<br />
Service table address:0x80567980 Number of services:280=0x127<br />
Index Address Parameters Name <br />
-------------------------------------------------------------------------------------------------<br />
0x0 0x8058ddce 6 NtAcceptConnectPort <br />
0x1 0x80596b7e 8 NtAccessCheck <br />
0x2 0x805976ce b NtAccessCheckAndAuditAlarm <br />
0x3 0x805a8bb7 b NtAccessCheckByType <br />
0x4 0x8059968a 10 NtAccessCheckByTypeAndAuditAlarm <br />
0x5 0x80658705 b NtAccessCheckByTypeResultList <br />
0x6 0x8065a9b2 10 NtAccessCheckByTypeResultListAndAuditAlarm <br />
0x7 0x8065a9f5 11 NtAccessCheckByTypeResultListAndAuditAlarmByHandle <br />
0x8 0x8059dc4f 3 NtAddAtom <br />
0xb 0x806581e2 6 NtAdjustGroupsToken <br />
0xc 0x80597836 6 NtAdjustPrivilegesToken <br />
0xd 0x8065104b 2 NtAlertResumeThread <br />
0xe 0x805971ea 1 NtAlertThread <br />
0xf 0x805996cc 1 NtAllocateLocallyUniqueId <br />
0x10 0x80647eb9 3 NtAllocateUserPhysicalPages <br />
0x11 0x805a70dc 4 NtAllocateUuids <br />
0x12 0x80583188 6 NtAllocateVirtualMemory <br />
0x13 0x8058faff 2 NtApphelpCacheControl <br />
0x14 0x805e92fb 2 NtAreMappedFilesTheSame <br />
0x15 0x805aae6f 2 NtAssignProcessToJobObject <br />
0x16 0x804ebbcc 3 NtCallbackReturn <br />
0x18 0x805eb49d 2 NtCancelIoFile <br />
0x19 0x804f7445 2 NtCancelTimer <br />
0x1a 0x8058c43a 1 NtClearEvent <br />
0x1b 0x805768ac 1 NtClose <br />
0x1c 0x80596eea 3 NtCloseObjectAuditAlarm <br />
0x1d 0x80626f6f 2 NtCompactKeys <br />
0x1e 0x8065b8ff 3 NtCompareTokens <br />
0x1f 0x8058dc82 1 NtCompleteConnectPort <br />
0x20 0x806271d6 1 NtCompressKey <br />
0x21 0x8058c55a 8 NtConnectPort <br />
0x22 0x804eb14b 2 NtContinue <br />
0x23 0x805b0b1e 4 NtCreateDebugObject <br />
0x24 0x805aabaf 3 NtCreateDirectoryObject <br />
0x25 0x80578522 5 NtCreateEvent <br />
0x26 0x80668009 3 NtCreateEventPair <br />
0x27 0x805790cb b NtCreateFile <br />
0x28 0x8059f5ab 4 NtCreateIoCompletion <br />
0x29 0x805e09eb 3 NtCreateJobObject <br />
0x2a 0x80651805 3 NtCreateJobSet <br />
0x2b 0x80592a39 7 NtCreateKey <br />
0x2c 0x805f225d 8 NtCreateMailslotFile <br />
0x2d 0x805863a1 4 NtCreateMutant <br />
0x2e 0x8058f416 e NtCreateNamedPipeFile <br />
0x2f 0x805c8e1e 4 NtCreatePagingFile <br />
0x30 0x805a32a4 5 NtCreatePort <br />
0x31 0x805bd684 8 NtCreateProcess <br />
0x32 0x8058efe3 9 NtCreateProcessEx <br />
0x33 0x806685b7 9 NtCreateProfile <br />
0x34 0x80573eca 7 NtCreateSection <br />
0x35 0x8059afa9 5 NtCreateSemaphore <br />
0x36 0x805ab548 4 NtCreateSymbolicLinkObject <br />
0x37 0x80588254 8 NtCreateThread <br />
0x38 0x805a2688 4 NtCreateTimer <br />
0x39 0x805a62a4 d NtCreateToken <br />
0x3a 0x805bc212 5 NtCreateWaitablePort <br />
0x3b 0x805b12c1 2 NtDebugActiveProcess <br />
0x3c 0x805b17dc 3 NtDebugContinue <br />
0x3d 0x80574c08 2 NtDelayExecution <br />
0x3e 0x8059ab90 1 NtDeleteAtom <br />
0x41 0x805b7979 1 NtDeleteFile <br />
0x42 0x805eca87 1 NtDeleteKey <br />
0x43 0x8065aa3a 3 NtDeleteObjectAuditAlarm <br />
0x44 0x805a20d4 2 NtDeleteValueKey <br />
0x45 0x80586f5e a NtDeviceIoControlFile <br />
0x46 0x805c9f0b 1 NtDisplayString <br />
0x47 0x8058051e 7 NtDuplicateObject <br />
0x48 0x8059cc7c 6 NtDuplicateToken <br />
0x4b 0x8059a085 6 NtEnumerateKey <br />
0x4c 0x80667a42 3 NtEnumerateSystemEnvironmentValuesEx <br />
0x4d 0x8059d849 6 NtEnumerateValueKey <br />
0x4e 0x805ac037 2 NtExtendSection <br />
0x4f 0x805e41d5 6 NtFilterToken <br />
0x50 0x8059e01a 3 NtFindAtom <br />
0x51 0x805920a7 2 NtFlushBuffersFile <br />
0x52 0x8058a8b5 3 NtFlushInstructionCache <br />
0x53 0x805e715b 1 NtFlushKey <br />
0x54 0x805a130d 4 NtFlushVirtualMemory <br />
0x55 0x80648b20 0 NtFlushWriteBuffer <br />
0x56 0x8064852a 3 NtFreeUserPhysicalPages <br />
0x57 0x8057b2bf 4 NtFreeVirtualMemory <br />
0x58 0x8057f504 a NtFsControlFile <br />
0x59 0x805e8674 2 NtGetContextThread <br />
0x5a 0x8064de05 2 NtGetDevicePowerState <br />
0x5b 0x805e8ccb 4 NtGetPlugPlayEvent <br />
0x5c 0x80544ec4 7 NtGetWriteWatch <br />
0x5d 0x805f12e2 1 NtImpersonateAnonymousToken <br />
0x5e 0x80597fdf 2 NtImpersonateClientOfPort <br />
0x5f 0x8059b9c8 3 NtImpersonateThread <br />
0x60 0x805b77c8 1 NtInitializeRegistry <br />
0x61 0x8064dc59 4 NtInitiatePowerAction <br />
0x62 0x8058ec31 2 NtIsProcessInJob <br />
0x63 0x8064ddf2 0 NtIsSystemResumeAutomatic <br />
0x64 0x805bc19c 2 NtListenPort <br />
0x65 0x805b9dfe 1 NtLoadDriver <br />
0x66 0x805b2d8f 2 NtLoadKey <br />
0x67 0x8062758c 3 NtLoadKey2 <br />
0x68 0x805b4a6c 4 NtLoadKeyEx <br />
0x69 0x805a2342 a NtLockFile <br />
0x6a 0x805e4eaa 2 NtLockProductActivationKeys <br />
0x6b 0x805de064 1 NtLockRegistryKey <br />
0x6c 0x805e4a65 4 NtLockVirtualMemory <br />
0x6d 0x805ab8ba 1 NtMakePermanentObject &n
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -