这里可以设置广告或签名,请到【首页】用户名旁边-【设置】-【个人资料】-【个人信息】-【个人签名】设置
|
对于淘宝旺旺和支付宝ActiveX控件,我们淘宝卖家是再熟悉不过的了,卖家们可能都仅仅知道他们的表面作用,却很少有人知道这些淘宝的客户端和控件都在背地里对我们的电脑里干了些什么!说出来可能大家都有点诧异。这些客户端和控件不仅仅就是你看见的那些表面的作用,他们在你不知不觉中轻易的获取到了你电脑本机的各种信息。不信?!那薄言就简单的帮大家分析下,只要你安装了淘宝旺旺,他就会在你的电脑上建立一个权限,简称建权,不要和我说你的电脑安装了什么杀毒软件,本机安全策略已经很严密了!还有太多东西你不懂的!除了薄言没有几个人能防得住这样的信息抓取,有点大言不惭了哈!
# l8 a7 C* S. ~8 D- s w: A 在这里薄言简单的调用C语言,下面是薄言本人写的一些代码,可以调用出太多东西了,基本上我想要抓取的都可以很轻松的获取到,大家可以参考下,如果看不懂代码的,那你就看看这篇文章的标题,或者下来以后恶补一下计算机知识!另说一句,薄言尚可如此,淘宝的工程师可是比薄言要强大十倍百倍哦!# I' h- |/ c' a7 m, F1 B6 g
1 ?, ^$ H+ I( u+ b8 e$ X# t
. E* ]7 ]9 \9 ~; }) m8 G. y# D操作系统的登录用户名
; n4 m" k: ?9 |" jstring GetUserName()
" ]( `, F4 d. J0 t. u, {{
7 |) N) m5 [ Q0 [: t% i% y try$ E. J }" b, h" \+ {
{6 O. d) R$ b0 f
string st = "";, b: V+ Q/ h; }
ManagementClass mc = new ManagementClass("Win32_ComputerSystem");' \7 k9 {: B6 p3 N4 B. l
ManagementObjectCollection moc = mc.GetInstances();
" ^; b+ [7 T3 e5 |) D: u foreach (ManagementObject mo in moc)
$ c K, t) }5 W {
" k# j1 X8 X0 X! h( h- x4 K st = mo["UserName"].ToString();4 A, M9 x5 l! r! R7 ?& m0 o
}9 |1 L3 P9 C, @0 w; n: N
moc = null;* }! R0 O7 j$ x, P: W1 k. @# \4 [
mc = null;( j3 F! ~% k7 f3 P/ V" t
return st;
8 \! r2 G: m9 `" \+ p }
+ H' n. y& _& I catch
0 B. n1 H0 M( C$ f( h- g* T {% ~ U: l8 M' ~: B; f
return "unknow";' P+ ^& H2 K+ X- v) {$ s
}' w/ C8 Z S/ L/ i/ t3 _
finally
8 J# |) K- R& a: O Y { }
) Y& s# a3 L; y6 H5 ]}
% e3 c0 e J/ c0 Y8 i获取MAC地址
0 K* Z/ R' |/ H: n& |string GetMacAddress(): s9 M2 R" r# h& l3 W% i. @2 {
{: y; H+ V: c: f/ c
try
* i$ {7 o& O- _' m, t {
2 B' B" Q0 i5 ` //获取网卡硬件地址6 k/ I" }% S% y6 ]! w
string mac = "";: S# U* z7 K$ D4 M
ManagementClass mc = new ManagementClass("Win32_NetworkAdapterConfiguration");* j' r! f! a# A
ManagementObjectCollection moc = mc.GetInstances();
2 E8 E5 Y) E: y2 e* ^# K foreach (ManagementObject mo in moc)$ ]9 ~2 W( r% I& A( t( U6 q( G
{
3 A% c8 o+ u- Z2 y if ((bool)mo["IPEnabled"] == true)9 H1 q( m0 l% |; s) s
{4 T p7 C# V A+ [! Q
mac = mo["MacAddress"].ToString();0 Y0 f! K9 I% a" ~9 z( k- \+ u* b
break;
* j( B! G% q! I6 ]3 h }
1 q3 g' l. j4 _* ~6 m }
. }+ n8 Z4 V4 b# g moc = null; q' x% v/ t$ _
mc = null;
9 m: C$ P5 Q* j- T0 H$ v6 d return mac;/ s7 u1 `/ w, K/ j' e C" d( |% Z% C
}
2 O# D! l1 F0 c7 i/ @7 E* t! n4 |' r7 Y catch
0 o h" u+ o k+ i0 C( F {
) \+ P8 c6 ]* X9 a) j1 o4 h/ S+ q return "unknow";
5 B' |' K# I5 G T6 ]( s, L }# {* @9 s4 Z" y4 i% v. _3 c. i/ _
finally3 R' v2 n. r0 b8 L. t% x; P% ^
{ }
5 H, I/ z3 [" R4 L. s: b" s# N6 K}
" D$ w5 L" r! K, z6 j8 y! H) Y. {获取IP地址
8 x, k$ a8 {) M///
' ^5 q1 k0 Z) m* u* |# H$ m1 w /// 获取客户端内网IP地址
5 o0 A1 t7 @( L0 h! I0 B ///# \2 g; I) S& ~: X, d, P' k
///5 E% ~4 W( r% T* b8 j4 D" l
private static string getClientLocalIPAddress()
5 D8 a$ q( j! a2 ?8 P { A I$ E, @0 R/ {! w; a1 E& D/ u
string localIP=null;" K! O6 T, ~/ p2 W1 L
try+ F. t. N' a7 W& V8 v; m! N8 m
{
! R. X% d/ R4 P, w9 v& n: F+ ]# v( z# r IPHostEntry ipHost = System.Net.Dns.GetHostEntry(Dns.GetHostName());// Dns.Resolve(Dns.GetHostName()); ;
$ }7 I, T( `; O V. ? IPAddress ipaddress = ipHost.AddressList[0];) u) v6 v& z _0 o
localIP = ipaddress.ToString();
8 ?. o9 p2 `9 F) k+ a* e return "内网IP地址:"+localIP;' l1 C; N/ W9 m6 @* W% }6 a
}' R2 y6 x( s$ B) A
catch% Q2 g7 e P! i; g) G+ }
{7 L% M: o: A6 I+ X Y- Q5 T! ^8 O
return "内网IP地址:unknown";
! `, |) m* \7 T" K }& S3 g- V$ s% ^1 y1 L6 Z, I
finally0 Q( d$ Q* }* L5 R Y6 s9 m. X
{ }
- M6 L) T; B; v( O6 g4 ~7 G }
0 C" o. L7 W4 ?, w# k; W ///# `& P7 c5 k: {1 K6 c+ G- Y+ F
/// 获得客户端外网IP地址0 a% Q& k7 s) O. b" Q# R0 U4 Z+ h: a
///
3 O& {: m% m% w! R3 O4 k /// IP地址) O7 i. U* m+ c$ \- z0 f) p
public static string getClientInternetIPAddress()5 M4 @- F, p9 f
{3 l1 ]& S V" n6 G( d( f: a3 U1 a& o2 U
string internetAddress = "";7 N. ]. j* c/ X, |1 }+ f
try
& s2 Q- D% _/ |7 n# C, U {
/ k9 {6 ?% M5 b& y1 g using (WebClient webClient = new WebClient())8 H0 Y, U1 O, [& e6 n9 f) f, s* U" g; W
{8 v z3 \% s1 n! ]" T
internetAddress = webClient.DownloadString("http://www.coridc.com/ip");//从外部网页获得IP地址
; H1 X/ K, }$ @% ?# P //判断IP是否合法+ P: e) ?: h) }. }7 H
if (!System.Text.RegularExpressions.Regex.IsMatch(internetAddress, "[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}"))
- v ^6 s( E: W& V2 `) L; [ {
% O& S, V4 F; ^ internetAddress = webClient.DownloadString("http://fw.qq.com/ipaddress");//从腾讯提供的API中获得IP地址9 _$ r: a) D C
}
0 Y. `# ^/ D9 U }
3 a: Q5 d9 l2 {, ^+ t! o! A7 _ return "外网IP地址:" + internetAddress;' h$ z8 `; I1 N$ E& _$ J+ a9 z1 t
}2 N0 l5 K& o, y- d H! M- a) ^- O
catch5 E& W9 L9 N4 ]
{+ K% J- O. E6 q2 C7 j) A- R' l& D6 k1 k
return "外网IP地址:unknown"; ]# J; q! Z" N3 [# I) x& `
}8 V( I4 X! |1 {2 b9 [- M. k% ]
finally
! t% I* Z. X4 K8 w1 t$ q$ q { }
1 y, t3 @1 Z8 [; H }
; w1 q' {7 ^& Y获取硬盘ID- y$ C' Y' B. R, _# O9 N; A
string GetDiskID()( Y! Q) D6 |1 L4 E5 V! e0 I
{
" R5 x5 z+ t; `& @! d$ o$ y1 y# P try
; f1 u* f* o3 F) n5 S5 u {' ~$ d1 a% G! z m ?" Z" l& ^
String HDid = "";
C5 p4 ]( \/ u$ _% I6 A ManagementClass mc = new ManagementClass("Win32_DiskDrive");7 a4 P( ?! X! b/ v+ e4 y6 {7 K
ManagementObjectCollection moc = mc.GetInstances();, M2 d7 c7 G6 g6 N4 K7 @! l4 l/ E8 Y' l
foreach (ManagementObject mo in moc)
4 \+ ^* L# z9 Y: O* J* G4 y! b2 C, S {+ L6 ?$ i: C0 A
//HDid = (string)mo.Properties["Model"].ToString();
! \$ u3 G' g* M8 \3 r HDid = (String)mo.Properties["Model"].Value.ToString();: Z. {; A- m0 G
}) B3 `! _& P% {5 @& B
moc = null;
' p6 K3 s7 E) P5 r0 b/ o: m: D mc = null;- r, T4 ~, f; r; R5 k
return HDid;4 O/ I% O; `0 B; F+ H
} W# |3 k9 U% y6 \2 R# n
catch
2 x( A8 t! q" E' j/ \ {
6 [6 v1 O: z% T' Z+ F: r3 K return "unknow";6 i6 ^! p! Q9 C4 {1 ^2 f
}
8 Z3 _# D# i& B finally
' {# Q3 X; g! X0 ` { }3 F8 z$ K6 C8 x% L) L- C
}
1 K; N0 s- ^/ a) _) D4 r; o* ~$ V获取CPUid9 P3 X6 b% i+ D' T+ `
string GetCpuID()
4 k" p; N3 w, B7 T+ m8 d" ]{+ Q d9 Y; G! z$ V" I" t3 M
try( l3 F+ B- V. }3 `# `# a: n- P
{; [0 u, y o( t& l# B
//获取CPU序列号代码$ L' @6 \3 j) \. ]
string cpuInfo = "";//cpu序列号9 h Y3 T# l* T, l# G
ManagementClass mc = new ManagementClass("Win32_Processor");
9 K$ R' \) V, j4 {# _8 t" T ManagementObjectCollection moc = mc.GetInstances();
" |' o% o: k- g; } s foreach (ManagementObject mo in moc)
# L& h7 R0 U/ h8 I* V {, o1 m+ ^$ I& g7 K$ L) w
cpuInfo = mo.Properties["ProcessorId"].Value.ToString();9 M- _' ]5 T; }% D
}% J7 L) u3 z5 }; T' U7 A
moc = null;1 f' E0 K p" }0 H9 ~( e) J9 T
mc = null;& h5 y4 ]4 c- u6 `
return cpuInfo;
) Y6 ?8 M! O$ f( u5 F1 t }3 i# g. W/ h P o
catch, ^; V: T; i9 l2 n, P% b
{
+ u2 T3 W2 d% E d. i return "unknow";/ _& {1 ?5 b! G" S1 f6 q
}
$ c: z8 K7 N8 \& @* O8 D% ]9 O+ e finally( z* P6 H8 [( G8 Y9 ^. V g5 Q
{ }
! ]* q) R0 b5 M, w7 \6 h; \}9 E* y0 T/ N. y% A
系统名称! `4 y: u7 a$ e+ H e
string GetSystemType() `* }# Y& b: J- D
{/ ~. w9 d* e6 ]* I
try
5 P- Y; P, T [; K" z2 \ {% Q2 R( r' S1 i. y6 O4 Z+ X
string st = "";! T4 C3 ^* o; Q% [% W- w) w4 U
ManagementClass mc = new ManagementClass("Win32_ComputerSystem");
$ r m- U9 P8 H- P5 m ManagementObjectCollection moc = mc.GetInstances();' g; F5 a" e9 A( o0 h8 F
foreach (ManagementObject mo in moc)
2 t# Y, I2 R+ Y; S: g {! Q* W2 {* O ~" }
st = mo["SystemType"].ToString();" u6 X: Z9 \# `5 e7 `2 k0 \
}
C0 }) D% H) @# H! i moc = null;
1 w8 c1 w& [+ I: N& t$ ? mc = null;
v1 [) H$ N7 a- Y) }8 D" v4 U- v+ w2 s return st;
; q" }4 t- B, Y0 b% O6 x' E }2 j+ k2 c% E" M
catch
5 a: q! P; J5 |" ? {
5 {8 l0 c, _! p- J) S! y return "unknow";
$ C; q! I* Q- j }0 c1 N: a2 T# T3 d
finally9 r2 h1 |+ u9 I
{ }
( Z2 h0 P, |3 e) V3 F}
+ H0 P" ^- y9 `: b获取物理内存8 a! A" G5 Z, L, l: K
string GetTotalPhysicalMemory()
. ^" b, w; Z% r, p& U( w1 w. n{
! A1 n: ~% j, ]2 b, v7 q try2 w/ T. V7 l r# f7 Z' T: A
{% g" n5 w& w$ i3 d
string st = "";
9 `' F# v0 Y0 k+ G# A1 O( f$ [ ManagementClass mc = new ManagementClass("Win32_ComputerSystem");
; W# V$ q, Q, |4 R ManagementObjectCollection moc = mc.GetInstances();2 U2 t- W8 q X# }& L" [7 F
foreach (ManagementObject mo in moc)+ q/ b5 { ?7 i. z( E
{$ M. ^5 E' L ]6 w
st = mo["TotalPhysicalMemory"].ToString();" s. R# ^. \: N7 l: e8 J& ?! y
}1 k8 @4 O& ~+ f+ o+ D
moc = null;9 X' l, E8 {* k4 A7 S5 w
mc = null;
) Y5 |9 z# I: O3 a6 G5 @) `; v return st;! |/ e& `4 [+ V: {; B9 o9 x4 o' h+ I
}
; ~; G/ r1 R" X( @ catch
; L8 G) A. `6 \* N/ A. U" B$ a {
) s2 c" t3 I8 B; C/ u2 l! i return "unknow";$ H4 V2 r" S: q; h6 Q
}4 T1 _2 M6 Z# T6 E# u
finally! E9 ]. G- P0 {: `1 i. T) {
{ }
) A$ x6 Z$ t5 i( O) r}4 K) ]3 i+ [7 {, u1 r1 Z/ S
这段代码 直接挖到心脏处5 k( l# Q" ~( J) A0 u3 i
BIOS 编号,支持 AMI, AWARD, PHOENIX
9 Q! {2 \2 ^$ H; KSIZE_T ssize;; E3 @7 \% [1 @7 V
. a- Y) w/ P& _/ D( s; G' i5 V& f; c% ~
LARGE_INTEGER so;
# h* d, @# h( j2 G* { so.LowPart=0x000f0000;, r% }0 n* ^5 }1 `; _' O
so.HighPart=0×00000000;
: b/ f. Y% P9 L# }+ w; L, s ssize=0xffff;
" W7 ]) H" C$ c# E' P+ d; y" R' O/ K wchar_t strPH[30]=L\\device\\physicalmemory;
# f. ]( }8 Y: s, F
9 {6 S8 H! j7 O5 z
! Q: O; ~ O! X7 ]8 J DWORD ba=0;
! A* f1 N1 t9 X" E; ?5 @) i: u: ~
$ b6 y" n0 {! J* U# J: X% y
UNICODE_STRING struniph;
& b+ R: ?8 G+ u K( Z; [6 @* Q4 Y struniph.Buffer=strPH;8 E( d6 H6 Y9 k" T, G
struniph.Length=0x2c;
) k5 a- `" y. x struniph.MaximumLength =0x2e;- C% v. z) [& O
8 O3 D3 R7 D7 f
& J6 R# [- W; ~- q5 U. `5 [2 z OBJECT_ATTRIBUTES obj_ar;
2 L# p$ X& {; _/ _9 F$ c obj_ar.Attributes =64;5 A+ y# `! Z' ^; H0 ^
obj_ar.Length =24; I3 `6 z4 Q3 r1 b
obj_ar.ObjectName=&struniph;* H. H1 U* D, Q0 h2 K9 u1 P
obj_ar.RootDirectory=0;
: O+ d' d3 o& N/ |! d obj_ar.SecurityDescriptor=0;
& O6 c/ i* V. V! h obj_ar.SecurityQualityOfService =0;
6 P6 U% B, W/ L" [/ U8 w# i
0 m! X7 D2 N7 ^0 Z' b( J2 a9 X) G! h7 s+ a0 Q: W. p
HMODULE hinstLib = LoadLibrary("ntdll.dll");
. T w F3 Q4 V" n# e; G* Q ZWOS ZWopenS=(ZWOS)GetProcAddress(hinstLib,"ZwOpenSection");
/ G4 |3 d6 z. W ZWMV ZWmapV=(ZWMV)GetProcAddress(hinstLib,"ZwMapViewOfSection");; |& A7 ~# K9 q4 a" v4 G
ZWUMV ZWunmapV=(ZWUMV)GetProcAddress(hinstLib,"ZwUnmapViewOfSection");& E- R! _8 D$ K' p$ h
& U, D0 e& H( p4 l3 X$ ~* D. j; S
//调用函数,对物理内存进行映射 F6 ]1 z6 d9 k( W9 x
HANDLE hSection;
9 Q& l, W# w9 Z b- {+ e- S- Q if( 0 == ZWopenS(&hSection,4,&obj_ar) &&/ n: {. l8 A3 i0 [5 r9 p9 ]: h
0 == ZWmapV(
# X; U" ]* T1 ~ ( HANDLE )hSection, //打开Section时得到的句柄( [& t+ C) M( ~8 N3 @$ J
( HANDLE )0xFFFFFFFF, //将要映射进程的句柄,+ ^ d5 y. I. t8 P2 e
&ba, //映射的基址9 ^2 |- a8 H; R$ N
0,( {1 [# r$ F3 E, k6 o! x" Q7 A
0xFFFF, //分配的大小) N/ u3 ?/ J: }2 V
&so, //物理内存的地址( n* m1 ?4 i; G, q: q; i
&ssize, //指向读取内存块大小的指针( y6 S) V7 R* M- D$ W9 E
1, //子进程的可继承性设定- M1 u8 }7 n! ?, s& _1 B# S: c
0, //分配类型+ [) q' G5 |2 q2 b; F+ c5 V8 F9 p
2 //保护类型
@4 R$ o) A0 p5 X& d: p ) ); u9 K2 d5 i* b x, z
//执行后会在当前进程的空间开辟一段64k的空间,并把f000:0000到f000:ffff处的内容映射到这里
# w: \; N6 m) J2 D$ ~ //映射的基址由ba返回,如果映射不再有用,应该用ZwUnmapViewOfSection断开映射
9 ]' w5 r4 ?* R" l y {5 R9 l* {. X( T! M/ F
BYTE* pBiosSerial = ( BYTE* )ba;5 N: a3 s7 G8 r6 m. z! z
UINT uBiosSerialLen = FindAwardBios( &pBiosSerial );
+ P, _/ ?% ^; k) f% [ if( uBiosSerialLen == 0U )
! B1 w/ E) Q- | {8 w# s5 f! M3 `! {5 `" Y
uBiosSerialLen = FindAmiBios( &pBiosSerial );; h8 I' p5 C1 d. \* y; Z
if( uBiosSerialLen == 0U )+ P$ L9 F+ }1 @/ o( ]9 u
{9 k2 t# u0 K; w5 z
uBiosSerialLen = FindPhoenixBios( &pBiosSerial );
6 U( R$ |' f8 j, v3 } }
1 o, P: d" e/ J }
7 [1 i# O) U! L; p if( uBiosSerialLen != 0U )
u2 k) O/ e* N1 y6 ~: `' X1 ? {
7 U3 A: X$ X+ R1 P CopyMemory( szSystemInfo + uSystemInfoLen, pBiosSerial, uBiosSerialLen );- |+ z6 }% e; a, t: z4 T
uSystemInfoLen += uBiosSerialLen;" h1 d6 A9 d x4 ?& L- m9 ^
}! u( ~5 t' L6 n: u
ZWunmapV( ( HANDLE )0xFFFFFFFF, ( void* )ba );
- _6 F3 k, V* y3 O- ^ }
9 H3 ]" h# R) |( \- `8 k5 b }
1 x; b6 `' {6 b1 \; |( [ // 完毕, 系统特征码已取得。/ z7 d* G) k Z0 z" L% k+ P
然后就是ActiveX了,在功能上,插件通常是用来渲染页面里的标签,并不会增加浏览器自身的功能。插件通常实现比较底层的功能,一般以操作系统的本地代码(也叫“原生代码”)编写,可以调用操作系统的API。形式上,插件以动态库(Windows操作系统就是DLL文件)的方式加载到浏览器的进程里,所以安装了淘宝旺旺后,再用淘宝旺旺轮番登陆小号进行操作基本上是必死无疑的,就算不安装淘宝旺旺,当你安装了支付宝控件,同样也是不行的哦!看到这里大家绝望了,想要避开淘宝稽核系统的追踪看来是没戏了,其实不然,安全的方法当然是有的,只是限于篇幅,这里无法展开了,在淘宝稽核系统伪装脱逃技术教程中薄言为大家准备了详细的操作方法和演示!5 e# ?1 w0 H/ r3 j6 G
2 }) G3 a6 E7 A# i9 h' u
|
评分
-
查看全部评分
|