当前位置:网站首页>Network security - vulnerabilities and Trojans
Network security - vulnerabilities and Trojans
2022-07-03 01:42:00 【One of IT guys】
The goal is :
Restore the scene through the classic Trojan attack , To make a Trojan horse , And the implementation of the implanted Trojan to fully control the target host .

Trojan overview :
- Trojans are often called hacker programs , Malicious code , Also known as Trojans
- Hacker tools based on remote control
The characteristics of Trojans :
- Concealment
- Latency
- Regeneration
The composition of the Trojan :
- Client program
The client program is installed on the attacker ( hackers ) Fang's console , It's in charge of remote control command
- Server program
The server program is a Trojan horse program , It is hidden installed in the attacked ( Victimization ) Fang's computer , The target host is also called broiler
The harm of Trojans :
- Embezzle user information
Such as : Online game account 、 Online banking information 、QQ Password etc.
- Spread the virus
- Occupy system resources , Reduce computer performance
- Use this machine as a tool to attack other devices
Signs of being hit by a Trojan :
- The hard disk keeps reading and writing
- The mouse and keyboard don't work
- The window suddenly closes
- The new window opened inexplicably
Trojans spread through :
- When browsing a web page, exploit the browser vulnerability or the browser plug-in (flash、 Thunderbolt etc. ) Loophole
- adopt QQ、MSN And other instant messaging software , Send malicious links or Trojan files
- Use U Disk and other removable storage media
- Open a strange email , Through malicious code in email or attachments containing trojan virus
- Application software disguised as multimedia audio-visual file or implanted Trojan , utilize P2P Platform and website dissemination
- Take advantage of operating system vulnerabilities or weak passwords to directly put them remotely
- Download programs from unknown sources
Introduction to the environment :
Virtual machine software :VMWare
virtual machine :
Windows10- Simulated hacker attack machine
windowsserver 2008 - Simulation is controlled by Trojan
Tools :
Grey dove software
NTscan
Experimental process :

Turn on two virtual machines :


Configure two computers IP And test connectivity :


Make a Trojan :
Use grey dove Trojan horse to make software

Brute force :
Aim to get the other party's account and password





Successful control of target host :

Reference video :
边栏推荐
- 电信客户流失预测挑战赛
- [data mining] task 2: mimic-iii data processing of medical database
- STM32 - Application of external interrupt induction lamp
- 网络安全-密码破解
- 网络安全-防火墙
- Uniapp component -uni notice bar notice bar
- 网络安全-扫描
- What operations need attention in the spot gold investment market?
- Tâche 6: regroupement DBSCAN
- VIM 9.0 is officially released! The execution speed of the new script can be increased by up to 100 times
猜你喜欢

PS去除水印详解

Qtablewidget lazy load remaining memory, no card!

LeetCode 987. Vertical order transverse of a binary tree - Binary Tree Series Question 7
![[data mining] task 5: k-means/dbscan clustering: double square](/img/e7/678197e703d1a28b765a0e3afd5580.png)
[data mining] task 5: k-means/dbscan clustering: double square

C#应用程序界面开发基础——窗体控制(1)——Form窗体

Why can't the start method be called repeatedly? But the run method can?

Sweet talk generator, regular greeting email machine... Open source programmers pay too much for this Valentine's day
![[error record] the shutter component reports an error (no directionality widget found. | richtext widgets require a directionality)](/img/3c/93ef853784d4e7cef63f30be0b0bf2.jpg)
[error record] the shutter component reports an error (no directionality widget found. | richtext widgets require a directionality)

网络安全-漏洞与木马
![[技术发展-23]:DSP在未来融合网络中的应用](/img/2e/f39543a18a8f58b1d341ce72cc4427.png)
[技术发展-23]:DSP在未来融合网络中的应用
随机推荐
数学知识:台阶-Nim游戏—博弈论
tail -f 、tail -F、tailf的区别
QTableWidget懒加载剩内存,不卡!
Druid database connection pool
Work experience of a hard pressed programmer
¢ growth path and experience sharing of getting an offer
Is there a handling charge for spot gold investment
Vant implements a simple login registration module and a personal user center
Take you ten days to easily complete the go micro service series (II)
Main features of transport layer TCP and TCP connection
Force buckle 204 Count prime
STM32 - GPIO input / output mode
High resolution network (Part 1): Principle Analysis
Wireshark data analysis and forensics a.pacapng
数学知识:Nim游戏—博弈论
High-Resolution Network (篇一):原理刨析
Uniapp component -uni notice bar notice bar
【數據挖掘】任務6:DBSCAN聚類
What are the trading forms of spot gold and what are the profitable advantages?
音程的知识的总结