查看: 19666|回复: 106
收起左侧

[转帖] 别有用心?360安全浏览器阻止金山网盾

 关闭 [复制链接]
mouse_0232
发表于 2009-11-19 19:21:19 | 显示全部楼层 |阅读模式
据金山毒霸论坛用户反馈,360安全浏览器最新测试版(版本3.1.0.1002)和金山网盾不兼容。随后金山网盾工程师紧急解决,并通过逆向分析,发现360安全浏览器3.1 beta2版“暗藏杀机”。  点击查看:金山毒霸论坛原帖(已关闭回复)
  以下是金山网盾工程师的逆向分析:



360安全浏览器 SafeCentral.dll

  (上图文字:我不知道这两个dll到底得罪了谁,但是让人非常不解的是360安全浏览器3.1 beta2的更新中。明确指出了这两个文件并阻止加载。)
  经分析发现,360安全浏览器的SafeCentral.dll模块挂接了kernel32!LoadLibraryA,对应的钩子函数为SafeCentralLoadLibraryA
  下面为SafeCentralLoadLibraryA函数的部分代码:
360安全浏览器模块 SafeCentral.dll逆向分析

  s_Kwsui_dll变量成了黑名单:
s_Kwsui_dll变量成了黑名单

  从上面代码可以看出,SafeCentralLoadLibraryA函数就做了一件事——阻止网盾三个核心DLL的加载。
  原文见此:360安全浏览器3.1beta版本影响金山网盾安全模块正常工作

  注:PConline转载此文出于传递更多信息之目的,并不意味着赞同其观点或证实其描述。文章内容仅供参考。我们将继续关注事件发展。

[ 本帖最后由 will 于 2009-11-19 21:18 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
法外制裁者
发表于 2009-11-19 19:26:37 | 显示全部楼层
真是一波未平一波又起啊

PS 图挂掉啦
mouse_0232
 楼主| 发表于 2009-11-19 19:27:17 | 显示全部楼层
  我只是转载的 俺不想参与竞争中
边缘vip
发表于 2009-11-19 19:43:09 | 显示全部楼层
请楼主重新编辑图片后再行发布!
mouse_0232
 楼主| 发表于 2009-11-19 19:49:53 | 显示全部楼层
编辑完了
IllusionWing
发表于 2009-11-19 19:52:10 | 显示全部楼层
interesting..
360 SE 真。。。hook了个LoadLibraryA...
这年头hook这玩意儿有什么用。。
taoyuan237
发表于 2009-11-19 19:55:37 | 显示全部楼层

回复 6楼 IllusionWing 的帖子

小羽简单的说说这个函数有什么用吧
IllusionWing
发表于 2009-11-19 19:56:33 | 显示全部楼层

回复 7楼 taoyuan237 的帖子

加载库文件
可以用于防注入(防那种弱智到家的进程注入)


LoadLibrary Function

Loads the specified module into the address space of the calling process. The specified module may cause other modules to be loaded.

For additional load options, use the LoadLibraryEx function.

Syntax
C++ HMODULE WINAPI LoadLibrary(
  __in  LPCTSTR lpFileName
);
Parameters
lpFileName [in]
The name of the module. This can be either a library module (a .dll file) or an executable module (an .exe file). The name specified is the file name of the module and is not related to the name stored in the library module itself, as specified by the LIBRARY keyword in the module-definition (.def) file.

If the string specifies a full path, the function searches only that path for the module.

If the string specifies a relative path or a module name without a path, the function uses a standard search strategy to find the module; for more information, see the Remarks.

If the function cannot find the module, the function fails. When specifying a path, be sure to use backslashes (\), not forward slashes (/). For more information about paths, see Naming a File or Directory.

If the string specifies a module name without a path and the file name extension is omitted, the function appends the default library extension .dll to the module name. To prevent the function from appending .dll to the module name, include a trailing point character (.) in the module name string.

Return Value
If the function succeeds, the return value is a handle to the module.

If the function fails, the return value is NULL. To get extended error information, call GetLastError.

Remarks
To enable or disable error messages displayed by the loader during DLL loads, use the SetErrorMode function.

LoadLibrary can be used to load a library module into the address space of the process and return a handle that can be used in GetProcAddress to get the address of a DLL function. LoadLibrary can also be used to load other executable modules. For example, the function can specify an .exe file to get a handle that can be used in FindResource or LoadResource. However, do not use LoadLibrary to run an .exe file. Instead, use the CreateProcess function.

If the specified module is a DLL that is not already loaded for the calling process, the system calls the DLL's DllMain function with the DLL_PROCESS_ATTACH value. If DllMain returns TRUE, LoadLibrary returns a handle to the module. If DllMain returns FALSE, the system unloads the DLL from the process address space and LoadLibrary returns NULL. It is not safe to call LoadLibrary from DllMain. For more information, see the Remarks section in DllMain.

Module handles are not global or inheritable. A call to LoadLibrary by one process does not produce a handle that another process can use — for example, in calling GetProcAddress. The other process must make its own call to LoadLibrary for the module before calling GetProcAddress.

If lpFileName does not include a path and there is more than one loaded module with the same base name and extension, the function returns a handle to the module that was loaded first.

If no file name extension is specified in the lpFileName parameter, the default library extension .dll is appended. However, the file name string can include a trailing point character (.) to indicate that the module name has no extension. When no path is specified, the function searches for loaded modules whose base name matches the base name of the module to be loaded. If the name matches, the load succeeds. Otherwise, the function searches for the file.

The first directory searched is the directory containing the image file used to create the calling process (for more information, see the CreateProcess function). Doing this allows private dynamic-link library (DLL) files associated with a process to be found without adding the process's installed directory to the PATH environment variable. If a relative path is specified, the entire relative path is appended to every token in the DLL search path list. To load a module from a relative path without searching any other path, use GetFullPathName to get a nonrelative path and call LoadLibrary with the nonrelative path. For more information on the DLL search order, see Dynamic-Link Library Search Order.

The search path can be altered using the SetDllDirectory function. This solution is recommended instead of using SetCurrentDirectory or hard-coding the full path to the DLL.

If a path is specified and there is a redirection file for the application, the function searches for the module in the application's directory. If the module exists in the application's directory, LoadLibrary ignores the specified path and loads the module from the application's directory. If the module does not exist in the application's directory, LoadLibrary loads the module from the specified directory. For more information, see Dynamic Link Library Redirection.

If you call LoadLibrary with the name of an assembly without a path specification and the assembly is listed in the system compatible manifest, the call is automatically redirected to the side-by-side assembly.

The system maintains a per-process reference count on all loaded modules. Calling LoadLibrary increments the reference count. Calling the FreeLibrary or FreeLibraryAndExitThread function decrements the reference count. The system unloads a module when its reference count reaches zero or when the process terminates (regardless of the reference count).

Windows Server 2003 and Windows XP:  The Visual C++ compiler supports a syntax that enables you to declare thread-local variables: _declspec(thread). If you use this syntax in a DLL, you will not be able to load the DLL explicitly using LoadLibrary on versions of Windows prior to Windows Vista. If your DLL will be loaded explicitly, you must use the thread local storage functions instead of _declspec(thread). For an example, see Using Thread Local Storage in a Dynamic Link Library.
Security Remarks
Do not use the SearchPath function to retrieve a path to a DLL for a subsequent LoadLibrary call. The SearchPath function uses a different search order than LoadLibrary and it does not use safe process search mode unless this is explicitly enabled by calling SetSearchPathMode with BASE_SEARCH_PATH_ENABLE_SAFE_SEARCHMODE. Therefore, SearchPath is likely to first search the user’s current working directory for the specified DLL. If an attacker has copied a malicious version of a DLL into the current working directory, the path retrieved by SearchPath will point to the malicious DLL, which LoadLibrary will then load.

Do not make assumptions about the operating system version based on a LoadLibrary call that searches for a DLL. If the application is running in an environment where the DLL is legitimately not present but a malicious version of the DLL is in the search path, the malicious version of the DLL may be loaded. Instead, use the recommended techniques described in Getting the System Version.
jpzy
发表于 2009-11-19 20:03:03 | 显示全部楼层

回复 8楼 IllusionWing 的帖子

你这岂不是说金山……
IllusionWing
发表于 2009-11-19 20:04:34 | 显示全部楼层

回复 9楼 jpzy 的帖子

您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-24 03:03 , Processed in 0.132740 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表