当前位置:网站首页>Network security - vulnerabilities and Trojans
Network security - vulnerabilities and Trojans
2022-07-03 01:42:00 【One of IT guys】
The goal is :
Restore the scene through the classic Trojan attack , To make a Trojan horse , And the implementation of the implanted Trojan to fully control the target host .

Trojan overview :
- Trojans are often called hacker programs , Malicious code , Also known as Trojans
- Hacker tools based on remote control
The characteristics of Trojans :
- Concealment
- Latency
- Regeneration
The composition of the Trojan :
- Client program
The client program is installed on the attacker ( hackers ) Fang's console , It's in charge of remote control command
- Server program
The server program is a Trojan horse program , It is hidden installed in the attacked ( Victimization ) Fang's computer , The target host is also called broiler
The harm of Trojans :
- Embezzle user information
Such as : Online game account 、 Online banking information 、QQ Password etc.
- Spread the virus
- Occupy system resources , Reduce computer performance
- Use this machine as a tool to attack other devices
Signs of being hit by a Trojan :
- The hard disk keeps reading and writing
- The mouse and keyboard don't work
- The window suddenly closes
- The new window opened inexplicably
Trojans spread through :
- When browsing a web page, exploit the browser vulnerability or the browser plug-in (flash、 Thunderbolt etc. ) Loophole
- adopt QQ、MSN And other instant messaging software , Send malicious links or Trojan files
- Use U Disk and other removable storage media
- Open a strange email , Through malicious code in email or attachments containing trojan virus
- Application software disguised as multimedia audio-visual file or implanted Trojan , utilize P2P Platform and website dissemination
- Take advantage of operating system vulnerabilities or weak passwords to directly put them remotely
- Download programs from unknown sources
Introduction to the environment :
Virtual machine software :VMWare
virtual machine :
Windows10- Simulated hacker attack machine
windowsserver 2008 - Simulation is controlled by Trojan
Tools :
Grey dove software
NTscan
Experimental process :

Turn on two virtual machines :


Configure two computers IP And test connectivity :


Make a Trojan :
Use grey dove Trojan horse to make software

Brute force :
Aim to get the other party's account and password





Successful control of target host :

Reference video :
边栏推荐
- ¢ growth path and experience sharing of getting an offer
- Leetcode skimming questions_ Sum of two numbers II - enter an ordered array
- [error record] an error is reported in the fluent interface (no mediaquery widget ancestor found. | scaffold widgets require a mediaquery)
- A simple tool for analyzing fgui dependencies
- STM32 - vibration sensor control relay on
- [error record] the shutter component reports an error (no directionality widget found. | richtext widgets require a directionality)
- 简易分析fgui依赖关系工具
- [data mining] task 2: mimic-iii data processing of medical database
- [androd] module dependency replacement of gradle's usage skills
- 网络安全-扫描与密码爆破2
猜你喜欢

"Jetpack - livedata parsing"

Androd gradle's substitution of its use module dependency

C#应用程序界面开发基础——窗体控制(1)——Form窗体
![[error record] navigator operation requested with a context that does not include a naviga](/img/53/e28718970a2f7226ed53afa27f6725.jpg)
[error record] navigator operation requested with a context that does not include a naviga

【数据挖掘】任务6:DBSCAN聚类

【数据挖掘】任务2:医学数据库MIMIC-III数据处理

Smart management of Green Cities: Digital twin underground integrated pipe gallery platform

并发编程的三大核心问题 -《深入理解高并发编程》

Take you ten days to easily complete the go micro service series (II)

简易分析fgui依赖关系工具
随机推荐
Meituan dynamic thread pool practice ideas, open source
Virtual list
7-25 read numbers (loop switch)
[keil5 debugging] debug is stuck in reset_ Handler solution
What is tone. Diao's story
[技术发展-23]:DSP在未来融合网络中的应用
What are the trading forms of spot gold and what are the profitable advantages?
[my advanced journey of OpenGL learning] collation of Euler angle, rotation order, rotation matrix, quaternion and other knowledge
网络安全-openvas
The meaning of wildcard, patsubst and notdir in makefile
网络安全-破解系统密码
【数据挖掘】任务1:距离计算
[Appendix 6 Application of reflection] Application of reflection: dynamic agent
What operations need attention in the spot gold investment market?
Summary of interval knowledge
Work experience of a hard pressed programmer
音程的知识的总结
2022-02-15 reading the meta module inspiration of the influxdb cluster
Steps to obtain SSL certificate private key private key file
MySQL - database query - basic query