标签:
标 题: 密码控件安全技术浅析及攻击实例ntdll!DbgBreakPoint: 00000000`77410530 cc int 3 0:209> bp USER32!SetWindowsHookExW 0:209> g
(271c.4d7c): Break instruction exception - code 80000003 (first chance) Breakpoint 0 hit USER32!SetWindowsHookExW: 76d77603 8bff mov edi,edi 0:173:x86> kvn L10 # ChildEBP RetAddr Args to Child 00 4000ba84 73e94267 0000000d 5c1cca08 5c1c0000 USER32!SetWindowsHookExW (FPO: [Non-Fpo]) *** WARNING: Unable to verify checksum for npAliSecCtrl.DLL *** ERROR: Symbol file could not be found. Defaulted to export symbols for npAliSecCtrl.DLL - 01 4000bab4 5c1ccaf5 0000000d 5c1cca08 5c1c0000 IEShims!NS_SetWindowsHookEx::APIHook_SetWindowsHookExW+0x6b (FPO: [Non-Fpo]) WARNING: Stack unwind information not available. Following frames may be wrong. 02 4000bb04 5c1c62d2 00140154 00000007 0014050a npAliSecCtrl!NP_Initialize+0x21c7 03 4000bb50 76d662fa 4e1c3070 00000007 0014050a npAliSecCtrl!NP_Shutdown+0x269a 04 4000bb7c 76d66d3a 05940920 00140154 00000007 USER32!InternalCallWinProc+0x23 05 4000bbf4 76d66de8 00000000 05940920 00140154 USER32!UserCallWinProcCheckWow+0x109 (FPO: [Non-Fpo]) 06 4000bc50 76d66e44 010e22c0 00000000 00000007 USER32!DispatchClientMessage+0xe0 (FPO: [Non-Fpo]) 07 4000bc8c 775b010a 4000bca4 00000000 4000bde0 USER32!__fnDWORD+0x2b (FPO: [Non-Fpo]) 08 4000bcc4 5c1c9054 00140154 4e1c2f1c 00000001 ntdll_775a0000!KiUserCallbackDispatcher+0x2e (FPO: [0,0,0]) 09 4000bcfc 5c1c5d79 0014050a 00000007 000c0822 npAliSecCtrl!NP_Shutdown+0x541c 0a 4000bd4c 76d662fa 4e1c2f1c 4000c01c 000c0822 npAliSecCtrl!NP_Shutdown+0x2141 0b 4000bd78 76d66d3a 05940d80 0014050a 00000007 USER32!InternalCallWinProc+0x23 0c 4000bdf0 76d66de8 00000000 05940d80 0014050a USER32!UserCallWinProcCheckWow+0x109 (FPO: [Non-Fpo]) 0d 4000be4c 76d66e44 00e9fdf0 00000000 00000007 USER32!DispatchClientMessage+0xe0 (FPO: [Non-Fpo]) 0e 4000be88 775b010a 4000bea0 00000000 4000bf38 USER32!__fnDWORD+0x2b (FPO: [Non-Fpo]) 0f 4000bec0 5c1c6df4 0014050a 00000000 4e1c2ed4 ntdll_775a0000!KiUserCallbackDispatcher+0x2e (FPO: [0,0,0])
0:170:x86> bp USER32!SetWindowsHookExW ".printf \"Hit USER32!SetWindowsHookExW\\r\\n\"; g" 0:170:x86> bp USER32!NtUserUnhookWindowsHookEx ".printf \"Hit USER32!UnhookWindowsHookEx\\r\\n\"; g" 0:170:x86> bl 0 e x86 76d8f52b 0001 (0001) 0:**** USER32!NtUserUnhookWindowsHookEx ".printf \"Hit USER32!UnhookWindowsHookEx\\r\\n\"; g" 1 e x86 76d77603 0001 (0001) 0:**** USER32!SetWindowsHookExW ".printf \"Hit USER32!SetWindowsHookExW\\r\\n\"; g" 0:170:x86> g
(271c.1618): Unknown exception - code 800706ba (first chance) Hit USER32!SetWindowsHookExW Hit USER32!UnhookWindowsHookEx Hit USER32!SetWindowsHookExW Hit USER32!UnhookWindowsHookEx Hit USER32!SetWindowsHookExW Hit USER32!UnhookWindowsHookEx Hit USER32!SetWindowsHookExW Hit USER32!UnhookWindowsHookEx Hit USER32!SetWindowsHookExW Hit USER32!UnhookWindowsHookEx Hit USER32!SetWindowsHookExW Hit USER32!UnhookWindowsHookEx
0:173:x86> lm a 5c1c0000 start end module name 5c1c0000 5c27d000 npAliSecCtrl C (export symbols) npAliSecCtrl.DLL
标签:
原文地址:http://blog.csdn.net/otishiono/article/details/51524444