当前位置:网站首页>Network security - vulnerabilities and Trojans
Network security - vulnerabilities and Trojans
2022-07-03 01:42:00 【One of IT guys】
The goal is :
Restore the scene through the classic Trojan attack , To make a Trojan horse , And the implementation of the implanted Trojan to fully control the target host .
Trojan overview :
- Trojans are often called hacker programs , Malicious code , Also known as Trojans
- Hacker tools based on remote control
The characteristics of Trojans :
- Concealment
- Latency
- Regeneration
The composition of the Trojan :
- Client program
The client program is installed on the attacker ( hackers ) Fang's console , It's in charge of remote control command
- Server program
The server program is a Trojan horse program , It is hidden installed in the attacked ( Victimization ) Fang's computer , The target host is also called broiler
The harm of Trojans :
- Embezzle user information
Such as : Online game account 、 Online banking information 、QQ Password etc.
- Spread the virus
- Occupy system resources , Reduce computer performance
- Use this machine as a tool to attack other devices
Signs of being hit by a Trojan :
- The hard disk keeps reading and writing
- The mouse and keyboard don't work
- The window suddenly closes
- The new window opened inexplicably
Trojans spread through :
- When browsing a web page, exploit the browser vulnerability or the browser plug-in (flash、 Thunderbolt etc. ) Loophole
- adopt QQ、MSN And other instant messaging software , Send malicious links or Trojan files
- Use U Disk and other removable storage media
- Open a strange email , Through malicious code in email or attachments containing trojan virus
- Application software disguised as multimedia audio-visual file or implanted Trojan , utilize P2P Platform and website dissemination
- Take advantage of operating system vulnerabilities or weak passwords to directly put them remotely
- Download programs from unknown sources
Introduction to the environment :
Virtual machine software :VMWare
virtual machine :
Windows10- Simulated hacker attack machine
windowsserver 2008 - Simulation is controlled by Trojan
Tools :
Grey dove software
NTscan
Experimental process :
Turn on two virtual machines :
Configure two computers IP And test connectivity :
Make a Trojan :
Use grey dove Trojan horse to make software
Brute force :
Aim to get the other party's account and password
Successful control of target host :
Reference video :
边栏推荐
- wirehark数据分析与取证A.pacapng
- [AUTOSAR cantp] -2.11-uds diagnostic response frame data segment data padding data filling and data optimization data optimization (Theory + configuration)
- 给你一个可能存在 重复 元素值的数组 numbers ,它原来是一个升序排列的数组,并按上述情形进行了一次旋转。请返回旋转数组的最小元素。【剑指Offer】
- 网络安全-病毒
- Expérience de recherche d'emploi d'un programmeur difficile
- 网络安全-密码破解
- Tp6 fast installation uses mongodb to add, delete, modify and check
- [technology development-23]: application of DSP in future converged networks
- 网络安全-钓鱼
- mysql
猜你喜欢
传输层 TCP主要特点和TCP连接
海量数据冷热分离方案与实践
简易分析fgui依赖关系工具
并发编程的三大核心问题 -《深入理解高并发编程》
Pytest learning notes (12) -allure feature · @allure Step () and allure attach
wirehark数据分析与取证A.pacapng
Virtual list
Smart management of Green Cities: Digital twin underground integrated pipe gallery platform
【数据挖掘】任务1:距离计算
Learn the five skills you need to master in cloud computing application development
随机推荐
A simple tool for analyzing fgui dependencies
【数据挖掘】任务2:医学数据库MIMIC-III数据处理
网络安全-钓鱼
[AUTOSAR cantp] -2.11-uds diagnostic response frame data segment data padding data filling and data optimization data optimization (Theory + configuration)
C#应用程序界面开发基础——窗体控制(4)——选择类控件
Androd gradle's substitution of its use module dependency
一比特苦逼程序員的找工作經曆
Tâche 6: regroupement DBSCAN
[data mining] task 6: DBSCAN clustering
Give you an array numbers that may have duplicate element values. It was originally an array arranged in ascending order, and it was rotated once according to the above situation. Please return the sm
After reading this article, I will teach you to play with the penetration test target vulnhub - drivetingblues-9
[QT] encapsulation of custom controls
[shutter] animation animation (animatedwidget animation use process | create animation controller | create animation | create animatedwidget animation component | animation operation)
Steps to obtain SSL certificate private key private key file
简易分析fgui依赖关系工具
uniapp组件-uni-notice-bar通告栏
Related concepts of GDB in embedded system
[data mining] task 5: k-means/dbscan clustering: double square
C语言课程信息管理系统
Tp6 fast installation uses mongodb to add, delete, modify and check