Ethical Hacking - GAINING ACCESS(20)
CLIENT SIDE ATTACKS - Spoofing backdoor extension
- Change the extension of the trojan from exe to a suitable one.
- Make the trojan even more trustable.
We will use an old trick using the "right to left overload" character.
1. Open up the character map.
2. Go to find.
3. Search for U 202E.
4. Copy character.
5. Rename trojan an in the following format -> trojan[RTLO]pdf.exe
温馨提示: 本文由Jm博客推荐,转载请保留链接: https://www.jmwww.net/SQL/11910.html