in combination with
بالاشتراك مع
تعبير مهم
 

توقيع : MagicianMiDo32
الكهربا عندنا ف البيت غريبة
التيار مش ثابت
اتأكدت من كدا لما اللمبتين الي في اوضتي اتحرقوا(n)
كان المفروض الاحظ كدا لما اللمات في البيت كانت بتتحرق بسرعة
لكن قولت مليش علاقة طالما المبتين الي ف اوضتي شغالين
قولت علشان انا برنس وكدة مينفعش يتحرقو:D
او يمكن علشان بحب الضلمة:cool:
 
توقيع : MagicianMiDo32
توقيع : MagicianMiDo32
آآه
راسي وجعتني
اروح ارتاح شوية
 
توقيع : MagicianMiDo32
توفي الی رحمة الله تعالی الملك عبد الله ملك المملكة العربية السعودية
انا لله وانا اليه راجعون
 
توقيع : MagicianMiDo32
يارب الملك عبد الله يصحی تاني
ام بي سي اكشن قلبوها أخبار
يانهار اسود لو مجابوش شو الرو يوم الثلاث
:dead:
 
توقيع : MagicianMiDo32
Monday night raw
 
توقيع : MagicianMiDo32
C:\>rundll32.exe DLLname, Export arguments
 
توقيع : MagicianMiDo32
Because malicious DLLs frequently run most of their code in DLLMain
(called from the DLL entry point), and because DLLMain is executed whenever
the DLL is loaded, you can often get information dynamically by forcing the
DLL to load using rundll32.exe. Alternatively, you can even turn a DLL into
an executable by modifying the PE header and changing its extension to
force Windows to load the DLL as it would an executable.
To modify the PE header, wipe the IMAGE_FILE_DLL (0x2000) flag from the
Characteristics field in the IMAGE_FILE_HEADER. While this change won’t run any
imported functions, it will run the DLLMain method, and it may cause the mal-
ware to crash or terminate unexpectedly. However, as long as your changes
cause the malware to execute its malicious payload, and you can collect infor-
mation for your analysis, the rest doesn’t matter.
DLL malware may also need to be installed as a service, sometimes with a
convenient export such as InstallService, as listed in ipr32x.dll:
C:\>rundll32 ipr32x.dll,InstallService ServiceName
C:\>net start ServiceName
The ServiceName argument must be provided to the malware so it can be
installed and run. The net start command is used to start a service on a Win-
dows system.
NOTE When you see a ServiceMain function without a convenient exported function such as
Install or InstallService, you may need to install the service manually. You can do
this by using the Windows sc command or by modifying the registry for an unused ser-
vice, and then using net start on that service. The service entries are located in the
registry at HKLM\SYSTEM\CurrentControlSet\Services.
 
توقيع : MagicianMiDo32
Process Explorer shows five columns: Process (the process name),
PID (the process identifier), CPU (CPU usage), Description, and Company
Name. The view updates every second. By default, services are highlighted in
pink, processes in blue, new processes in green, and terminated processes in
red. Green and red highlights are temporary, and are removed after the process has started or terminated
 
توقيع : MagicianMiDo32
Process Explorer
Process monitor
 
توقيع : MagicianMiDo32
يارب الملك عبد الله يصحی تاني
ام بي سي اكشن قلبوها أخبار
يانهار اسود لو مجابوش شو الرو يوم الثلاث
:dead:
ح تفضل علی كدا اسبوع عااااا
صحيح شفتو ماتش الاهلي وطلائع الجيش امبارح
:shifty:
 
توقيع : MagicianMiDo32
Process Explorer allows you to launch depends.exe (Dependency Walker) on
a running process by right-clicking a process name and selecting Launch
Depends. It also lets you search for a handle or DLL by choosing Find
Find Handle or DLL.
The Find DLL option is particularly useful when you find a malicious
DLL on disk and want to know if any running processes use that DLL. The
Verify button verifies the EXE file on disk, but not every DLL loaded during
runtime. To determine whether a DLL is loaded into a process after load
time, you can compare the DLL list in Process Explorer to the imports shown
in Dependency Walker.
 
توقيع : MagicianMiDo32
Values modified:2
----------------------------------
 HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed: 00 43 7C 25 9C 68 DE 59 C6 C8
9D C3 1D E6 DC 87 1C 3A C4 E4 D9 0A B1 BA C1 FB 80 EB 83 25 74 C4 C5 E2 2F CE
4E E8 AC C8 49 E8 E8 10 3F 13 F6 A1 72 92 28 8A 01 3A 16 52 86 36 12 3C C7 EB
5F 99 19 1D 80 8C 8E BD 58 3A DB 18 06 3D 14 8F 22 A4

اذا وجدت اي احداث ريجستري تتضمن التغيير في هذا المفتاح
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed:
فتجاهلها لأن ال random-number generator seed يتغير باستمرار
 
توقيع : MagicianMiDo32
:shifty:
 
توقيع : MagicianMiDo32
<div id='MicrosoftTranslatorWidget' class='Dark' style='color:white;background-color:#555555'></div><script type='text/javascript'>setTimeout(function(){{var s=document.createElement('script');s.type='text/javascript';s.charset='UTF-8';s.src=((location && location.href && location.href.indexOf('https') == 0)?'
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي
p=document.getElementsByTagName('head')[0]||document.documentElement;p.insertBefore(s,p.firstChild); }},0);</script>
 
توقيع : MagicianMiDo32

فيديو مفيد جدا
كيف تقرأ كتابا مهما لاتود قراءته
1 ركز.....فقط الكتاب ....... الكتاب فقط
2 اقرأ جزء بجزء
او زنجة بزنجة:D
 
توقيع : MagicianMiDo32
Regshot
 
توقيع : MagicianMiDo32
ApateDNS
 
توقيع : MagicianMiDo32
Netcat
سكينة الجيش السويسري مع ال apate dns
Very good mix
 
توقيع : MagicianMiDo32
عودة
أعلى