首页 > 数据库技术 > 详细

Ethical Hacking - GAINING ACCESS(20)

时间:2020-02-05 11:13:29      阅读:74      评论:0      收藏:0      [点我收藏+]

CLIENT SIDE ATTACKS - Spoofing backdoor extension

  • Change the extension of the trojan from exe to a suitable one.
  • Make the trojan even more trustable.

We will use an old trick using the "right to left overload" character.

1. Open up the character map.

2. Go to find.

3. Search for U+202E.

4. Copy character.

5. Rename trojan an in the following format -> trojan[RTLO]pdf.exe

 

Ethical Hacking - GAINING ACCESS(20)

原文:https://www.cnblogs.com/keepmoving1113/p/12262415.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!