CN112800409B - Method, device and medium for bypassing login protection - Google Patents

Method, device and medium for bypassing login protection Download PDF

Info

Publication number
CN112800409B
CN112800409B CN202110023601.4A CN202110023601A CN112800409B CN 112800409 B CN112800409 B CN 112800409B CN 202110023601 A CN202110023601 A CN 202110023601A CN 112800409 B CN112800409 B CN 112800409B
Authority
CN
China
Prior art keywords
hook function
input data
layer
bypassing
handle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110023601.4A
Other languages
Chinese (zh)
Other versions
CN112800409A (en
Inventor
甘锐
傅博
王玲敏
李广斌
彭寿林
郭月丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Wulian Technology Co ltd
Original Assignee
Hangzhou Wulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Wulian Technology Co ltd filed Critical Hangzhou Wulian Technology Co ltd
Priority to CN202110023601.4A priority Critical patent/CN112800409B/en
Publication of CN112800409A publication Critical patent/CN112800409A/en
Application granted granted Critical
Publication of CN112800409B publication Critical patent/CN112800409B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a method, a device and a medium for bypassing login protection, wherein the method comprises the steps of obtaining a global variable and a non-bottom hook function, then transmitting the global variable and the non-bottom hook function into a first API (application programming interface) to obtain a handle of the bottom hook function, storing obtained input data in a memory of a structure body corresponding to the non-bottom hook function, and simulating a message queue of the bottom hook function and the bottom hook function according to the handle of the bottom hook function and the structure body so as to send the input data to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.

Description

Method, device and medium for bypassing login protection
Technical Field
The present application relates to the field of game service technologies, and in particular, to a method, an apparatus, and a medium for bypassing login protection.
Background
With the development of network technology and cloud computing technology, a novel game mode is created: and (5) cloud games. In the cloud game mode, all game programs run on a cloud host provided by a cloud game service provider, the cloud host is responsible for rendering game pictures by using a high-performance Central Processing Unit (CPU) and a Graphics Processing Unit (GPU), and a video streaming program compresses the pictures displayed by the cloud host and then transmits the compressed pictures to a user through a network. In order to enhance the competitiveness of the own cloud game service, a game service provider usually purchases a high-performance computer as a cloud host. However, for players who do not need too high computer performance, there is redundancy in the performance of the cloud host when the cloud host is used to individually provide services for the part of users.
In recent years, in order to reduce the problem of performance redundancy, a game method is adopted in which a plurality of users are operated on a single cloud host, so that the plurality of users share hardware resources to fully exert the entire performance of the cloud host. At present, when a plurality of users log in a game on a cloud host, in order to avoid mutual interference of keyboard and mouse operation data of the plurality of users, a multi-user analog input scheme is adopted, that is, collected user input data is firstly stored in a memory, and the cloud host simulates a message queue and a rawnput queue of a non-underlying keyboard hook function through Application Program Interfaces (API) such as AllocateHidData, postInputMessage, freeHidData, validateHwnd, xxxsendtransformatemailed message timeout and posttransformatemailed message extension, and sends a simulation result to the game. However, since the game has a login protection function, whether the user inputs the password on the real keyboard or not can be judged through the message queue and the rawInput queue of the bottom-layer keyboard hook function, and the API interfaces cannot simulate the message queue and the rawInput queue of the bottom-layer keyboard hook function, so that data simulated by the API interfaces can be judged as malicious data by the game to cause user input invalidation, normal login cannot be achieved, and the experience of the user using the cloud host is reduced.
Therefore, how to improve the experience of the user using the cloud host is a problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The application aims to provide a method for bypassing login protection, so as to improve the experience of a user using a cloud host. It is an object of the present application to also provide a device and medium that bypasses login protection.
To solve the above technical problem, the present application provides a method for bypassing login protection, including:
acquiring a global variable and a non-bottom-layer hook function;
transmitting the global variable and the non-bottom-layer hook function into a first API (application programming interface) interface to obtain a handle of the bottom-layer hook function;
storing the acquired input data in a memory of a structure body corresponding to the non-bottom-layer hook function;
the handle and the fabric are passed to a second API interface for sending the input data through the second API interface upon receipt of a signal to obtain the input data.
Preferably, before the obtaining the global variable and the non-bottom-layer hook function, the method further includes:
entering a critical area;
preferably, after the transmitting the handle and the structure to the second API interface, the method further includes:
and exiting the critical region.
Preferably, before entering the critical region, the method further comprises:
judging whether the input data is valid according to the type of the non-bottom-layer hook function;
if so, entering the critical region.
Preferably, before determining whether the input data is valid according to the type of the non-bottom-layer hook function, the method further includes:
judging whether the user login box is in a protected state or not;
if yes, the step of judging whether the input data is valid according to the type of the non-bottom-layer hook function is carried out.
Preferably, the non-bottom layer hook function is specifically a non-bottom layer keyboard hook function, and the bottom layer hook function is specifically a bottom layer keyboard hook function.
Preferably, the non-underlying KEYBOARD hook function is WH _ KEYBOARD _ LL.
Preferably, the input data is the input data after being processed by streaming.
In order to solve the above technical problem, the present application further provides a device for bypassing login protection, including:
the first acquisition module is used for acquiring a global variable and a non-bottom-layer hook function;
the second obtaining module is used for transmitting the global variable and the non-bottom-layer hook function into a first API (application program interface) to obtain a handle of the bottom-layer hook function;
the storage module is used for storing the acquired input data in a memory of the structure body corresponding to the non-bottom-layer hook function;
a transmitting module for transmitting the handle and the structure to a second API interface so as to transmit the input data through the second API interface upon receiving a signal to acquire the input data.
In order to solve the above technical problem, the present application further provides a device for bypassing login protection, including:
a memory for storing a computer program;
a processor for implementing the steps of the method of bypassing login protection as described above when executing said computer program.
To solve the above technical problem, the present application further provides a computer-readable storage medium having a computer program stored thereon, where the computer program is executed by a processor to implement the steps of the method for bypassing login protection as described above.
According to the method for bypassing login protection, after a global variable and a non-bottom hook function are obtained, the global variable and the non-bottom hook function are transmitted into a first API (application programming interface) to obtain a handle of the bottom hook function, obtained input data are stored in a memory of a structure body corresponding to the non-bottom hook function, and a message queue of the bottom hook function are simulated according to the handle of the bottom hook function and the structure body, so that the input data are sent to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
In addition, the device and the medium for bypassing the login protection correspond to the method for bypassing the login protection, and the effect is the same as that of the method for bypassing the login protection.
Drawings
In order to more clearly illustrate the embodiments of the present application, the drawings needed for the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
Fig. 1 is a flowchart of a method for bypassing login protection according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an apparatus for bypassing login protection according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of another apparatus for bypassing login protection according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without any creative effort belong to the protection scope of the present application.
The core of the application is to provide a method for bypassing login protection, so as to improve the experience of a user using a cloud host. The core of the application is also to provide a device and medium for bypassing login protection.
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings.
Fig. 1 is a flowchart of a method for bypassing login protection according to an embodiment of the present application. As shown in fig. 1, the method includes:
s10: and acquiring a global variable and a non-bottom-layer hook function.
In the embodiment of the application, the global variable is specifically a global variable obtained according to a win32kbase.sys program, and the non-bottom hook function is specifically a function which is mounted by an application program and is used for processing system messages, so that the application program can filter all messages and events and access messages which cannot be accessed under normal conditions through the function.
It can be understood that the non-underlying hook function may include multiple types, and in a specific implementation, which type of non-underlying hook function is adopted needs to be matched according to a login manner of an application installed on the cloud host. For example, some applications log in through input data of a mouse, and then obtain global variables and non-underlying mouse hook functions.
At present, most of the login modes of the application programs are login by inputting an account and a password through a keyboard, so as to be a preferred embodiment, the non-bottom layer hook function is specifically a non-bottom layer keyboard hook function. Due to the fact that the non-bottom-layer keyboard hook function is obtained, the login method of most application programs of the cloud host can be met, the disorder and the misuse of the non-bottom-layer hook function are avoided, and the use experience of a user is further improved.
S11: and transmitting the global variable and the non-bottom hook function into a first API (application programming interface) to obtain a handle of the bottom hook function.
It can be understood that after the global variable and the non-underlying hook function are obtained, the global variable and the non-underlying hook function are used as a first parameter and a second parameter to be transmitted into the first API interface, so as to obtain a handle of the underlying hook function.
Wherein, the first API interface may be a PhkFirstValid interface.
It should be noted that, the handle of the underlying hook function can be acquired through the PhkFirstValid interface. The bottom-layer hook function is specifically a bottom-layer hook function corresponding to the type of the above non-bottom-layer hook function. For example, the above non-underlying hook function is specifically a non-underlying mouse hook function, and the obtained handle of the underlying hook function is specifically a handle of the underlying mouse hook function.
At present, most application programs log in through keyboard input accounts and passwords, so as to be a preferred embodiment, on the basis that the non-bottom layer hook function is specifically a non-bottom layer keyboard hook function, the bottom layer hook function is specifically a bottom layer keyboard hook function. Due to the fact that the bottom-layer keyboard hook function is obtained, the login method of most application programs of the cloud host can be met, misuse of the bottom-layer hook function is avoided, and the use experience of a user is further improved.
S12: and storing the acquired input data in a memory of a structural body corresponding to the non-bottom-layer hook function.
In the embodiment of the application, in order to ensure that the application program obtains the input data of the user through the bottom-layer hook function simulated by the cloud host and the message queue of the bottom-layer hook function, the problem that the application program cannot obtain the input data due to mismatching of the simulated bottom-layer hook function and the storage area for storing the input data of the user is avoided, and therefore the input data needs to be stored in the memory of the structure body corresponding to the non-bottom-layer hook function. Taking the KEYBOARD hook function WH _ keybackd _ LL as an example, the corresponding structure is the kbdhllokstruct structure, and the input data is stored in the memory of the kbdholokstruct structure.
In order to make those skilled in the art better understand the embodiment of the present application, how the cloud host obtains the input data of the user will be described in detail below:
firstly, the terminal captures input data of a user through API (application programming interface) interfaces related to models RawInput and DX (full Duplex switched Ethernet) for capturing input data of a keyboard and a mouse, and transmits the input data to the cloud host through a network. Then, after receiving the input data, the cloud host transmits the input data to a driving layer of the cloud host through the communication interface IOCTRL, and after applying for a structural body corresponding to the non-bottom hook function, the cloud host stores the input data in a memory of the structural body so as to be used subsequently.
As a preferred embodiment, before the client transmits the input data to the cloud host, the input data may be further subjected to streaming processing, and the input data subjected to streaming processing is transmitted to the cloud host in a form of a network data packet. Due to the fact that the input data after the streaming processing is carried out, the cloud host can receive the input data without waiting for the completion of downloading, and therefore the efficiency and the speed of the cloud host for receiving the input data are improved.
S13: the handle and the fabric are passed to a second API interface for sending the input data through the second API interface upon receipt of a signal to retrieve the input data.
It should be noted that the handle and the structure containing the input data of the user are used as a third parameter and a fourth parameter and are transmitted into a second API interface, where the second API interface may be an xxxCallHook2 interface, and the xxxCallHook2 interface may enable the cloud host to send the input data to an application installed on the cloud host, that is, the xxxCallHook2 interface may send the input data to the application hooked with the bottom-layer hook function, so that the simulation of the message queues of the bottom-layer hook function and the bottom-layer hook function is completed.
According to the method for bypassing login protection, after a global variable and a non-bottom hook function are obtained, the global variable and the non-bottom hook function are transmitted into a first API (application programming interface) to obtain a handle of the bottom hook function, the obtained input data are stored in a memory of a structure body corresponding to the non-bottom hook function, and a message queue of the bottom hook function and the bottom hook function is simulated according to the handle of the bottom hook function and the structure body, so that the input data are sent to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
On the basis of the above embodiment, before S10, the method further includes: and entering a critical area.
After S13, further comprising: exiting the critical area.
In the embodiment of the present application, the critical region may be entered through an EnterCrit interface, and the critical region may be exited through a usersessionswitchlevere interface, where the critical region is specifically a Crit region.
It can be understood that, after entering the Crit region, the global variable can be obtained in the Crit region according to the win32kbase.sys program, so as to ensure the validity of the global variable in the method for bypassing the login protection provided by the application, and avoid that the handle of the bottom-layer hook function cannot be obtained due to the invalidity of the global variable.
According to the method for bypassing login protection provided by the embodiment of the application, the API finishes entering the critical area and exiting the critical area, and the method for bypassing login protection provided by the application is finished in the critical area, so that the subsequent used data can be ensured to be present and effective, and the phenomenon of blue screen caused by access violation due to absence or invalidity of the data is avoided.
On the basis of the above embodiment, before the step of entering the critical region, the method further includes:
judging whether the input data is valid according to the type of the non-bottom-layer hook function;
if yes, entering the step of entering the critical area.
It can be understood that whether the input data is matched with the type of the non-underlying hook function is judged in advance, so that the problem that the user cannot log in an application program due to the fact that the input data of the user cannot be sent to the application program through the second API in the subsequent cloud host is avoided, and the experience of the user in using the cloud host is further improved.
On the basis of the above embodiment, before the step of determining whether the input data is valid according to the type of the non-bottom-layer hook function, the method further includes:
and judging whether the user login box is in a protected state or not.
If yes, the step of judging whether the input data is valid according to the type of the non-bottom-layer hook function is carried out.
It will be appreciated that in the case where the user login box is not in a protected state, the API interface according to the prior art may: the system comprises an AllocateHidData interface, a PostInputMessage interface, a FreeHidData interface, a ValidateHwnd interface, a xxxSendTransformateMessameTimeout interface and a PostTransformateMessaeExtended interface, wherein a message queue and a RawInput queue of a non-bottom-layer hook function are simulated so as to facilitate logging in an application program; and under the condition that the user login box is in a protected state, logging in the application program by the method for bypassing login protection provided by the application.
The method for bypassing login protection provided by the embodiment of the application is adopted when the user login frame is in a protected state. Due to the fact that the workload of the method bypassing login protection is large, if all logins adopt the method provided by the application, the response efficiency of the application program is reduced, the response efficiency of the application program installed on the cloud host is improved, and the situation that the application program is blocked due to the reduction of the response efficiency is avoided.
On the basis of the above embodiment, the non-underlying KEYBOARD hook function is specifically WH _ keybackrd _ LL, and the corresponding structure is kbdhllokstruct.
In the embodiment of the application, because the non-bottom-layer KEYBOARD hook function specifically includes two types, namely WH _ keykeyboard and WH _ keykeyboard _ LL, and because WH _ keykeyboard can only respond to the KEYBOARD key message of a certain process, and the KEYBOARD key messages of other processes cannot respond, in specific implementation, a same user may need to log in multiple application programs.
In the foregoing embodiments, the method for bypassing login protection is described in detail, and the present application also provides a corresponding embodiment of a device that bypasses login protection. It should be noted that the present application describes the embodiments of the apparatus portion from two perspectives, one from the perspective of the function module and the other from the perspective of the hardware.
Fig. 2 is a schematic structural diagram of an apparatus for bypassing login protection according to an embodiment of the present application. As shown in fig. 2, the apparatus includes, based on the angle of the function module:
the first obtaining module 10 is configured to obtain a global variable and a non-bottom-layer hook function.
And the second obtaining module 11 is configured to transmit the global variable and the non-bottom hook function to the first API interface to obtain a handle of the bottom hook function.
And the storage module 12 is configured to store the acquired input data in a memory of a structure corresponding to the non-bottom hook function.
And a transmission module 13, configured to transmit the handle and the structure to the second API interface, so as to send the input data through the second API interface when receiving the signal for acquiring the input data.
Since the embodiments of the apparatus portion and the method portion correspond to each other, please refer to the description of the embodiments of the method portion for the embodiments of the apparatus portion, which is not repeated here.
As a preferred embodiment, the method further comprises the following steps:
the first entering module is used for entering the critical area.
And the exit module is used for exiting the critical area.
Further comprising:
and the first judging module is used for judging whether the input data is valid according to the type of the non-bottom-layer hook function.
And the second entering module is used for entering the step of entering the critical area if the critical area is reached.
Further comprising:
and the second judgment module is used for judging whether the user login box is in a protected state.
And the third judging module is used for entering the step of judging whether the input data is valid according to the type of the non-bottom-layer hook function if the input data is valid.
According to the device bypassing login protection, after the global variable and the non-bottom hook function are obtained, the global variable and the non-bottom hook function are transmitted into the first API interface to obtain the handle of the bottom hook function, the obtained input data are stored in the memory of the structure body corresponding to the non-bottom hook function, and the message queues of the bottom hook function and the bottom hook function are simulated according to the handle of the bottom hook function and the structure body, so that the input data are sent to the application program through the second API interface. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
Fig. 3 is a schematic structural diagram of another apparatus for bypassing login protection according to an embodiment of the present application. As shown in fig. 3, the apparatus includes, from the perspective of the hardware configuration:
a memory 20 for storing a computer program;
a processor 21 for implementing the steps of the method for bypassing login protection as in the above embodiments when executing the computer program.
The processor 21 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 21 may be implemented in at least one hardware form of Digital Signal Processing (DSP), field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 21 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 21 may be integrated with a Graphics Processing Unit (GPU) which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 21 may further include an Artificial Intelligence (AI) processor for processing computational operations related to machine learning.
Memory 20 may include one or more computer-readable storage media, which may be non-transitory. Memory 20 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In this embodiment, the memory 20 is at least used for storing a computer program 201, wherein after being loaded and executed by the processor 21, the computer program can implement the relevant steps of the method for bypassing login protection disclosed in any of the foregoing embodiments. In addition, the resources stored in the memory 20 may also include an operating system 202, data 203, and the like, and the storage manner may be a transient storage manner or a permanent storage manner. Operating system 202 may include, among others, windows, unix, linux, and the like. Data 203 may include, but is not limited to, data involved in bypassing methods of login protection, and the like.
In some embodiments, the means for bypassing login protection may further comprise a display screen 22, an input/output interface 23, a communication interface 24, a power supply 25, and a communication bus 26.
Those skilled in the art will appreciate that the configuration shown in fig. 3 is not intended to be limiting of devices that bypass log protection and may include more or fewer components than those shown.
The device for bypassing login protection provided by the embodiment of the application comprises a memory and a processor, wherein when the processor executes a program stored in the memory, the following method can be realized: after acquiring the global variable and the non-bottom hook function, the global variable and the non-bottom hook function are transmitted into a first API (application programming interface) to acquire a handle of the bottom hook function, the acquired input data are stored in a memory of a structure body corresponding to the non-bottom hook function, and a message queue of the bottom hook function and the message queue of the bottom hook function are simulated according to the handle of the bottom hook function and the structure body, so that the input data are transmitted to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
Finally, the application also provides a corresponding embodiment of the computer readable storage medium. The computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps as set forth in the above-mentioned method embodiments.
It is to be understood that if the method in the above embodiments is implemented in the form of software functional units and sold or used as a stand-alone product, it can be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in the form of a software product, which is stored in a storage medium and executes all or part of the steps of the methods described in the embodiments of the present application, or all or part of the technical solutions. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The computer readable storage medium provided by the embodiment of the application, the medium is stored with a computer program, and when the computer program is executed by a processor, the following method can be realized: after acquiring the global variable and the non-bottom hook function, the global variable and the non-bottom hook function are transmitted into a first API (application programming interface) to acquire a handle of the bottom hook function, the acquired input data are stored in a memory of a structure body corresponding to the non-bottom hook function, and a message queue of the bottom hook function and the message queue of the bottom hook function are simulated according to the handle of the bottom hook function and the structure body, so that the input data are transmitted to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
A method, an apparatus, and a medium for bypassing login protection provided by the present application are described in detail above. The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed in the embodiment corresponds to the method disclosed in the embodiment, so that the description is simple, and the relevant points can be referred to the description of the method part. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A method of bypassing login protection, comprising:
acquiring a global variable and a non-bottom-layer hook function;
transmitting the global variable and the non-bottom-layer hook function into a first API (application program interface) to obtain a handle of the bottom-layer hook function;
storing the acquired input data in a memory of a structure body corresponding to the non-bottom-layer hook function;
and transmitting the handle and the structure body to a second API (application programming interface), and simulating a bottom hook function and a message queue of the bottom hook function according to the handle of the bottom hook function and the structure body so as to send the input data to an application program through the second API under the condition of receiving a signal for acquiring the input data.
2. The method of bypassing login protection according to claim 1, further comprising, before obtaining the global variable and the non-underlying hook function:
entering a critical area;
after the transmitting the handle and the structure to a second API interface, the method further includes:
and exiting the critical region.
3. The method for bypassing login protection according to claim 2, further comprising, before entering the critical area:
judging whether the input data is valid according to the type of the non-bottom-layer hook function;
if so, entering the critical region.
4. The method of bypassing login protection according to claim 3, wherein before determining whether the input data is valid according to the type of the non-underlying hook function, further comprising:
judging whether the user login box is in a protected state or not;
if yes, the step of judging whether the input data is valid according to the type of the non-bottom-layer hook function is carried out.
5. The method of bypassing login protection according to any one of claims 1 to 4, wherein the non-bottom layer hook function is specifically a non-bottom layer keyboard hook function, and the bottom layer hook function is specifically a bottom layer keyboard hook function.
6. The method of bypassing login protection according to claim 5, wherein the non-underlying KEYBOARD hook function is specifically WH _ KEYBOARD _ LL.
7. The method of bypassing login protection according to claim 1, wherein the input data is specifically the input data that is streamed.
8. An apparatus for bypassing login protection, comprising:
the first acquisition module is used for acquiring a global variable and a non-bottom-layer hook function;
the second obtaining module is used for transmitting the global variable and the non-bottom-layer hook function into a first API (application program interface) to obtain a handle of the bottom-layer hook function;
the storage module is used for storing the acquired input data in a memory of the structure body corresponding to the non-bottom-layer hook function;
and the transmission module is used for transmitting the handle and the structure body to a second API interface, and simulating a bottom hook function and a message queue of the bottom hook function according to the handle of the bottom hook function and the structure body so as to send the input data to an application program through the second API interface under the condition of receiving a signal for acquiring the input data.
9. An apparatus for bypassing login protection, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the method of bypassing login protection as claimed in any one of claims 1 to 7 when executing said computer program.
10. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of bypassing login protection according to any one of claims 1 to 7.
CN202110023601.4A 2021-01-08 2021-01-08 Method, device and medium for bypassing login protection Active CN112800409B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110023601.4A CN112800409B (en) 2021-01-08 2021-01-08 Method, device and medium for bypassing login protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110023601.4A CN112800409B (en) 2021-01-08 2021-01-08 Method, device and medium for bypassing login protection

Publications (2)

Publication Number Publication Date
CN112800409A CN112800409A (en) 2021-05-14
CN112800409B true CN112800409B (en) 2023-03-24

Family

ID=75809367

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110023601.4A Active CN112800409B (en) 2021-01-08 2021-01-08 Method, device and medium for bypassing login protection

Country Status (1)

Country Link
CN (1) CN112800409B (en)

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5935251A (en) * 1997-12-22 1999-08-10 Hewlett Packard Company Method and apparatus expedited log-on to an application program
CN101114323A (en) * 2006-07-28 2008-01-30 上海山丽信息安全有限公司 Device for monitoring keyboard hook
US9721228B2 (en) * 2009-07-08 2017-08-01 Yahoo! Inc. Locally hosting a social network using social data stored on a user's computer
CN102195940A (en) * 2010-03-12 2011-09-21 北京路模思科技有限公司 Virtual-machine-technology-based data security input and submission method and system
CN104573484A (en) * 2014-12-31 2015-04-29 上海动联信息技术股份有限公司 Highly safe password input box
CN106897078A (en) * 2015-12-17 2017-06-27 珠海市君天电子科技有限公司 Information obtaining method and device
US9684543B1 (en) * 2016-02-05 2017-06-20 Sas Institute Inc. Distributed data set storage, retrieval and analysis
US10095552B2 (en) * 2016-02-05 2018-10-09 Sas Institute Inc. Automated transfer of objects among federated areas
CN106446678A (en) * 2016-09-22 2017-02-22 武汉斗鱼网络科技有限公司 Method and system for protecting network account based on handle function
US20180285839A1 (en) * 2017-04-04 2018-10-04 Datient, Inc. Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ledger overlay network
CN109951726B (en) * 2019-03-08 2021-09-10 视联动力信息技术股份有限公司 Remote control method and device
CN111683091A (en) * 2020-06-08 2020-09-18 平安科技(深圳)有限公司 Method, device, equipment and storage medium for accessing cloud host console
CN112149193A (en) * 2020-11-03 2020-12-29 深圳市启望科文技术有限公司 Keyboard authorization monitoring method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN112800409A (en) 2021-05-14

Similar Documents

Publication Publication Date Title
CN101996073B (en) Component rendering method and device
US9021008B1 (en) Managing targeted scripts
CN104281458B (en) Application data processing method, device and processing system
CN113626133B (en) Virtual machine control method, device, equipment and computer readable storage medium
WO2024037110A1 (en) Data processing method and apparatus, device, and medium
CN110806922B (en) Script execution method, device, equipment and storage medium
CN115445194A (en) Rendering method, device and equipment of game and storage medium
CN112800409B (en) Method, device and medium for bypassing login protection
CN105357239A (en) Method and device for providing service, and method and device for acquiring service
CN114296953A (en) Multi-cloud heterogeneous system and task processing method
CN113691602A (en) Service processing method, system, device, equipment and medium based on cloud mobile phone
Barboza et al. A simple architecture for digital games on demand using low performance resources under a cloud computing paradigm
CN115454576B (en) Virtual machine process management method and system and electronic equipment
CN116932433A (en) Installation control method based on DPU and related equipment
CN111831991A (en) Input operation detection method, device, computing equipment and medium
CN108932142B (en) Picture capturing method and terminal
US20180267914A1 (en) Device interfacing
KR102168740B1 (en) Content Deployment, Scaling and Telemetry
CN111245810B (en) Method, device, equipment and medium for realizing cloud host functional terminal
CN111294661B (en) Bullet screen display method and device, bullet screen server equipment and storage medium
CN110262856B (en) Application program data acquisition method, device, terminal and storage medium
CN112733101A (en) Cloud server management method, device, storage medium and server terminal
CN110968368B (en) Live broadcast data processing method and related equipment thereof
CN112084099A (en) Method, device and equipment for obtaining alarm state value based on host and storage medium
CN112269741A (en) Application program compatibility testing method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant