Форум: "Система";
Текущий архив: 2003.09.08;
Скачать: [xml.tar.bz2];
ВнизКак отключить защиту файлов Windows? Найти похожие ветки
← →
укы (2003-06-25 08:17) [0]Здрасте, сабж....
Где-то на этом сайте кажется в форуме проскакивал ответ на этот вопрос но тогда я этому не уделил внимания, а теперь вот не могу найти, подскажите плиз кому не трудно!
Спасибо!
← →
AlexR (2003-06-25 22:12) [1]Какую защиту?
Может быть SFC? Тогда вот статья по этому поводу. Ее автор укзан в конце. Я к ней не имею никакого отношения.
<------------------------------------------------------>
Addendum 7:37pm 6/24/00 At End
6:13am 6/24/00
Summary: Undocumented registry setting allows for
Windows File Protection (aka System File Checker)
to be fully disabled.
HowTo: Set the SFCDisable value (see Q222473) to
0xffffff9d.
Ok, after spending 6 hours in the guts of sfc.dll, sfcfiles.dll,
and winlogon.exe I have *finally* discovered how to permanently
disable windows file protection. The more I dug into the internals
of SFC, the more I began to think that it would not be as easy as
I first thought it would be - and indeed Microsoft does not want it
to be easy. Windows File Protection, while annoying, does provide
a good degree of system stability and even some level of virus/trojan
protection by preventing system files from being modified without
at least notifying the user. Therefore, I was *very* shocked when
I was looking through a disassembly of sfc.dll and came to the code
that checks the value of the SfcDisable in the WinLogon key.
I see in the code of ordinal 1 (which is the initialization function
that winlogon calls), sticking out like a sore thumb, this:
76986A89 push 1
76986A8B cmp eax, ebx
76986A8D pop esi
76986A8E jz loc_76986B97
76986A94 cmp eax, esi
76986A96 jz loc_76986B7A
76986A9C cmp eax, 2
76986A9F jz loc_76986B69
76986AA5 cmp eax, 3
76986AA8 jz short loc_76986AE0
76986AAA cmp eax, 4
76986AAD jz short loc_76986ACF
76986AAF cmp eax, 0FFFFFF9Dh
76986AB2 push ebx
76986AB3 jz loc_76986B86
76986AB9 push offset byte_76981898
76986ABE push edi
76986ABF call sub_7698877D
76986AC4 mov dword_769901D4, ebx
76986ACA jmp ( HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon) Какую защиту?
Может быть SFC? Тогда вот статья по этому поводу. Ее автор укзан в конце. Я к ней не имею никакого отношения.
<------------------------------------------------------>
Addendum 7:37pm 6/24/00 At End
6:13am 6/24/00
Summary: Undocumented registry setting allows for
Windows File Protection (aka System File Checker)
to be fully disabled.
HowTo: Set the SFCDisable value (see Q222473) to
0xffffff9d.
Ok, after spending 6 hours in the guts of sfc.dll, sfcfiles.dll,
and winlogon.exe I have *finally* discovered how to permanently
disable windows file protection. The more I dug into the internals
of SFC, the more I began to think that it would not be as easy as
I first thought it would be - and indeed Microsoft does not want it
to be easy. Windows File Protection, while annoying, does provide
a good degree of system stability and even some level of virus/trojan
protection by preventing system files from being modified without
at least notifying the user. Therefore, I was *very* shocked when
I was looking through a disassembly of sfc.dll and came to the code
that checks the value of the SfcDisable in the WinLogon key.
I see in the code of ordinal 1 (which is the initialization function
that winlogon calls), sticking out like a sore thumb, this:
76986A89 push 1
76986A8B cmp eax, ebx
76986A8D pop esi
76986A8E jz loc_76986B97
76986A94 cmp eax, esi
76986A96 jz loc_76986B7A
76986A9C cmp eax, 2
76986A9F jz loc_76986B69
76986AA5 cmp eax, 3
76986AA8 jz short loc_76986AE0
76986AAA cmp eax, 4
76986AAD jz short loc_76986ACF
76986AAF cmp eax, 0FFFFFF9Dh
76986AB2 push ebx
76986AB3 jz loc_76986B86
76986AB9 push offset byte_76981898
76986ABE push edi
76986ABF call sub_7698877D
76986AC4 mov dword_769901D4, ebx
76986ACA jmp loc_76986B97
Ok, values 0, 1, 2, 3, and 4 are documented at
http://support.microsoft.com/support/kb/articles/Q222/4/73.ASP , but
what the heck is this 0ffffff9dh value that it accepts?! As you can
see, any value other than 0,1,2,3,4 and 0ffffff9dh are assumed to be
zero, which is the default of SFC enabled with popups enabled. So,
without further delay, I went and plugged 0ffffff9dh into the SfcDisable
value to see what was up. Rebooted. I"ll be darned, Microsoft provided
a very,very simple way to fully disable WFP!
When booting with this value in the SFCDisable value in the WinLogon
key (HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon), an
event is written to the system log, ID 64032 from Windows File
Protection, with the description:
"Windows File Protection is not active on this system. ".
All attempts to replace/delete protected system files succeeded,
just as if I were in safe mode :). I rebooted a few more times and
verified that it is the one value (other than 4=popus disabled) that
is not reset to 0 after the first boot.
Needless to say, this is not what Microsoft intended.
Well, it"s now 6am, hopefully I haven"t mucked this up too much in
my delerium.
Jeremy Collake
collake@charter.net
http://www.collakesoftware.com
Addendum 7:37pm 6/24/00:
SFCDisable value 3 was not documented like I thought it was. This
value performs some check for setup.exe or sfctest.exe. WFP does
appear to end up enabled. Have not had a chance to look into it further.
<------------------------------------------------------>
← →
ers (2003-06-26 06:47) [2]Спасибо! это то что нужно!;)
Страницы: 1 вся ветка
Форум: "Система";
Текущий архив: 2003.09.08;
Скачать: [xml.tar.bz2];
Память: 0.46 MB
Время: 0.015 c