Ethical Hacking - GAINING ACCESS(20)

Posted 一蓑烟雨

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了Ethical Hacking - GAINING ACCESS(20)相关的知识,希望对你有一定的参考价值。

CLIENT SIDE ATTACKS - Spoofing backdoor extension

  • Change the extension of the trojan from exe to a suitable one.
  • Make the trojan even more trustable.

We will use an old trick using the "right to left overload" character.

1. Open up the character map.

2. Go to find.

3. Search for U+202E.

4. Copy character.

5. Rename trojan an in the following format -> trojan[RTLO]pdf.exe

 

以上是关于Ethical Hacking - GAINING ACCESS(20)的主要内容,如果未能解决你的问题,请参考以下文章

Ethical Hacking - GAINING ACCESS

Ethical Hacking - GAINING ACCESS(20)

Ethical Hacking - GAINING ACCESS

Ethical Hacking - GAINING ACCESS(10)

Ethical Hacking - GAINING ACCESS(18)

Ethical Hacking - GAINING ACCESS(19)