[转载]杀毒软件的简单实现

[转载]杀毒软件的简单实现

信息来源:cnhonker
复制内容到剪贴板
代码:
#include "FunDef.h"

int main (int argc, char *argv[])
{
if (argc==1)
{
Usage(argv[0]);
return 0;
}

if (!(ScanFileVXER(argv[1])))
{
printf("ScanFileVXER() GetLastError reports %dn",erron);
return 0;
}

if (!(ProcessVXER()))
{
printf("Processes() GetLastError reports %dn",erron);
return 0;
}

if (!(RegDelVXER()))
{
printf("RegDelVXER() GetLastError reports %dn",erron);
return 0;
}

return 0;
}

BOOL ScanFileVXER (char *FileName)
{
int count=LOW;

WIN32_FIND_DATA FindFileData;
HANDLE hFind;
BOOL returnvalue=FALSE;
DWORD lpBufferLength=HIGH;
char lpBuffer[HIGH]={LOW};
char DirBuffer[MAX_PATH];

long FileOffset=0x1784; //偏移地址
int FileLength=0x77; //长度

unsigned char Contents[]={
0x49, 0x20, 0x6A, 0x75, 0x73, 0x74, 0x20, 0x77, 0x61, 0x6E, 0x74, 0x20, 0x74, 0x6F, 0x20, 0x73,
0x61, 0x79, 0x20, 0x4C, 0x4F, 0x56, 0x45, 0x20, 0x59, 0x4F, 0x55, 0x20, 0x53, 0x41, 0x4E, 0x21,
0x21, 0x20, 0x62, 0x69, 0x6C, 0x6C, 0x79, 0x20, 0x67, 0x61, 0x74, 0x65, 0x73, 0x20, 0x77, 0x68,
0x79, 0x20, 0x64, 0x6F, 0x20, 0x79, 0x6F, 0x75, 0x20, 0x6D, 0x61, 0x6B, 0x65, 0x20, 0x74, 0x68,
0x69, 0x73, 0x20, 0x70, 0x6F, 0x73, 0x73, 0x69, 0x62, 0x6C, 0x65, 0x20, 0x3F, 0x20, 0x53, 0x74,
0x6F, 0x70, 0x20, 0x6D, 0x61, 0x6B, 0x69, 0x6E, 0x67, 0x20, 0x6D, 0x6F, 0x6E, 0x65, 0x79, 0x20,
0x61, 0x6E, 0x64, 0x20, 0x66, 0x69, 0x78, 0x20, 0x79, 0x6F, 0x75, 0x72, 0x20, 0x73, 0x6F, 0x66,
0x74, 0x77, 0x61, 0x72, 0x65, 0x21, 0x21};
//具体内容,十六进制

//获取系统目录的完整路径
if (GetSystemDirectory(DirBuffer,lpBufferLength)!=LOW)
{
if (SetCurrentDirectory(DirBuffer)!=LOW) //设置为当前目录
{
hFind=FindFirstFile(FileName,&FindFileData); //查找文件
if (hFind==INVALID_HANDLE_value)
{
printf("FindFirstFile() GetLastError reports %dn",erron);
FindClose(hFind);
return returnvalue;
}
else
{
count++;

//获得文件的完整路径
if (GetFullPathName(FindFileData.cFileName,lpBufferLength,lpBuffer,NULL)!=LOW)
printf("FilePath:%sn",lpBuffer);
else
{
printf("GetFullPathName() GetLastError reports %dn",erron);
FindClose(hFind);
return returnvalue;
}
}

//进行特征码的匹配工作
ScanVXER(FindFileData.cFileName,FileOffset,FileLength,Contents);
}
}

while (FindNextFile(hFind,&FindFileData)) //继续查找文件
{
count++;

//以"."和".."除外
if (strcmp(".",FindFileData.cFileName)==LOW||strcmp("..",FindFileData.cFileName)==LOW)
{
printf("File no include "." and ".."n");
exit(0);
}

if (GetFullPathName(FindFileData.cFileName,lpBufferLength,lpBuffer,NULL)!=LOW)
printf("Next FilePath:%sn",lpBuffer);
else
{
printf("GetFullPathName() GetLastError reports %dn",erron);
FindClose(hFind);
exit(0);
}

ScanVXER(FindFileData.cFileName,FileOffset,FileLength,Contents);

}

printf("File Total:%dn",count); //打印出查找到的文件各数
FindClose(hFind); //关闭搜索句柄
returnvalue=TRUE;
return returnvalue;
}

BOOL ScanVXER (
char *V_FileName, //文件名
long V_FileOffset, //偏移地址
int V_Length, //长度
void *V_Contents) //具体内容
{
int cmpreturn=LOW;
char FileContents[HIGH]={LOW};
BOOL returnvalue=FALSE;
FILE *fp=NULL;

fp=fopen(V_FileName,"rb"); //以二进制只读方式打开
if (fp==NULL)
{
printf("File open FAILn");
fclose(fp);
return returnvalue;
}

fseek(fp,V_FileOffset,SEEK_SET); //把文件指针指向特征码在文件的偏移地址处
fread(FileContents,V_Length,1,fp);//读取长度为特征码长度的内容
cmpreturn=memcmp(V_Contents,FileContents,V_Length);
//进行特征码匹配。失败返回FALSE
if (cmpreturn==LOW)
{
printf("File Match completelyn"); //打印文件匹配消息
strcpy(name,V_FileName); //将文件名保存在全局变量name中
exit(0);
}
else
returnvalue=FALSE;
}

BOOL ProcessVXER (void)
{
DWORD lpidProcess[1024],cbNeeded_1,cbNeeded_2;
HANDLE hProc;
HMODULE hMod[1024];
char ProcFile[MAX_PATH];
char FileName[FIVE]={LOW};
BOOL returnvalue=FALSE;
int Pcount=LOW;
int i;

EnablePrivilege(SE_DEBUG_NAME); //提升权限

//枚举进程
if (!(EnumProcesses(lpidProcess,sizeof(lpidProcess),&cbNeeded_1)))
{
printf("EnumProcesses() GetLastError reports %dn",erron);
return 0;
}

for (i=LOW;i<(int)cbNeeded_1/4;i++)
{
//打开找到的第一个进程
hProc=OpenProcess(PROCESS_ALL_ACCESS,FALSE,lpidProcess);
if (hProc)
{
//枚举进程模块
if (EnumProcessModules(hProc,hMod,sizeof(hMod),&cbNeeded_2))
{
//枚举进程模块文件名,包含全路径
if (GetModuleFileNameEx(hProc,hMod[0],ProcFile,sizeof(ProcFile)))
{
printf("[%5d]t%sn",lpidProcess,ProcFile); //输出进程
//可以考虑将其注释掉,这样就不会输出进程列表了
Pcount++;

strcpy(FileName,"C:/WINNT/system32/");
strcat(FileName,name);//把文件名+路径复制到FileName变量中

//查找进程中是否包含FileName
if (strcmp(FileName,ProcFile)==LOW)
{
//如果包含,则杀掉。KillProc为自定义的杀进程函数
if (!(KillProc(lpidProcess)))
{
printf("KillProc() GetLastError reports %dn",erron);
CloseHandle(hProc);
exit(0);
}
DeleteFile(FileName); //进程杀掉后,再将文件删除
}
}
}
}
}

CloseHandle(hProc); //关闭进程句柄
printf("nProcess total:%dn",Pcount); //打印进程各数
returnvalue=TRUE;
return 0;
}

BOOL KillProc (DWORD *ProcessID)
{
HANDLE hProc;
BOOL returnvalue=FALSE;

//打开由ProcessVXER传递的进程PID
hProc=OpenProcess(PROCESS_ALL_ACCESS,FALSE,ProcessID);

if (hProc)
{
//终止进程
if (!(TerminateProcess(hProc,0)))
{
printf("TerminateProcess GetLastError reports %dn",erron);
return returnvalue;
}
}

CloseHandle(hProc);
returnvalue=TRUE;
return returnvalue;
}

BOOL EnablePrivilege(PCHAR PrivilegeName)
{
HANDLE hProc,hToken;
TOKEN_PRIVILEGES TP;
hProc=GetCurrentProcess(); //打开进程的一个伪句柄

if(!OpenProcessToken(hProc,TOKEN_ADJUST_PRIVILEGES,&hToken))
{
return FALSE;
}

if(!LookupPrivilegevalue(NULL,PrivilegeName,&TP.Privileges[0].Luid))
{
CloseHandle(hToken);
return FALSE;
}

TP.Privileges[0].Attributes=SE_PRIVILEGE_ENABLED;
TP.PrivilegeCount=1;

if(!AdjustTokenPrivileges(hToken,FALSE,&TP,sizeof(TP),0,0))
{
CloseHandle(hToken);
return FALSE;
}

CloseHandle(hToken);
return TRUE;
}

int RegDelVXER (void)
{
HKEY hkey;
DWORD ret=LOW;

//打开注册表的Run项
ret=RegOpenKeyEx(HKEY_LOCAL_MACHINE,
"SOFTWARE/Microsoft/Windows/CurrentVersion/Run/",
0,
KEY_ALL_ACCESS,
&hkey);

if (!ret==ERROR_SUCCESS)
{
printf("Register Open FAILn");
exit(0);
}

//删除键值windows auto update。
ret==RegDeletevalue(hkey,"windows auto update");

if (ret==ERROR_SUCCESS)
printf("Success Deleten");
else
{
printf("Delete FAILn");
exit(0);
}

RegCloseKey(hkey); //关闭打开的注册表项
return 1;
}

void Usage (char *Parameter)
{
char *Path="%SystemRoot%/system32/";

fprintf(stderr,"============================================================================n"
" 杀毒软件的简单实现n"
"环境:Win2K Adv Server + Visual C++ 6.0n"
"作者:dahubaobaon"
"主页:[url]www.RingZ.org;n[/url]"
"OICQ:382690n"
"邮件:[email]382690@qq.comn[/email]"
"声明:本帖由环行区(RingZ)原创,转载请注明出处,谢谢!nn"
"使用方法:n"
"%s 文件名。例如:%s msblast.exenn"
"注意事项:n"
"本程序只是简单介绍杀毒软件的编写方法,所以有很多不完善的地方,包括:n"
"1,本程序是以冲击波蠕虫做的例子n"
"2,文件遍历只搜索了%s目录下的文件n"
"3,本程序不能查杀冲击波变种nn"
"本程序只是用做代码交流,如有错误,还请多多包含!n"
"============================================================================"
,Parameter,Parameter,Path);
}
<script type="text/javascript">var tagarray = ['逆向工程','IIS','数据恢复','手机号','属主','猎头','招聘','Oracle','机器狗','感染','驱动编程','Ghost','EasyRecovery','DDoS','内核编程','Microsoft','Overflow','WPS','Office','Buffer','Serv-U','DataExplorer','百度'];var tagencarray = ['%E9%80%86%E5%90%91%E5%B7%A5%E7%A8%8B','IIS','%E6%95%B0%E6%8D%AE%E6%81%A2%E5%A4%8D','%E6%89%8B%E6%9C%BA%E5%8F%B7','%E5%B1%9E%E4%B8%BB','%E7%8C%8E%E5%A4%B4','%E6%8B%9B%E8%81%98','Oracle','%E6%9C%BA%E5%99%A8%E7%8B%97','%E6%84%9F%E6%9F%93','%E9%A9%B1%E5%8A%A8%E7%BC%96%E7%A8%8B','Ghost','EasyRecovery','DDoS','%E5%86%85%E6%A0%B8%E7%BC%96%E7%A8%8B','Microsoft','Overflow','WPS','Office','Buffer','Serv-U','DataExplorer','%E7%99%BE%E5%BA%A6'];parsetag();</script>
 
  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值