2/03/2009

Si vous avez compris, ne prenez pas la root ^_^

Extrait de cette édifiante interview with an adware author.

Next we made a function shuffler, which would go into an executable, take the functions and randomly shuffle them. Once you do that, then of course the signature’s all messed up. [ We also shuffled ] a lot of the pointers within each actual function. It completely changed the shape of the executable.

We then made a bootstrapper, which was a tiny tiny piece of code written in Assembler which would decrypt the executable in memory, and then just run it. At the same time, we also made a virtual process executable. I’ve never heard of anybody else doing this before. Windows has this thing called Create Remote Thread. Basically, the semantics of Create Remote Thread are: You’re a process, I’m a different process. I call you and say “Hey! I have this bit of code. I’d really like it if you’d run this.” You’d say, “Sure,” because you’re a Windows process– you’re all hippie-like and free love. Windows processes, by the way, are insanely promiscuous. So! We would call a bunch of processes, hand them all a gob of code, and they would all run it. Each process would all know about two of the other ones. This allowed them to set up a ring … mutual support, right?

Truely édifiant, pour les nerds qui fréquentent le site et qui veulent comprendre la mécanique windows et pourquoi elle est aussi pourrie.

Les autres ben .... allez faire du sport tiens !

Trouvé sur HACK A DAY

Aucun commentaire:

Enregistrer un commentaire