当前位置:首页 > 数据库 > 正文

Ethical Hacking - GAINING ACCESS(20)

2024-03-31 数据库

CLIENT SIDE ATTACKS - Spoofing backdoor extension

  • Change the extension of the trojan from exe to a suitable one.
  • Make the trojan even more trustable.

We will use an old trick using the "right to left overload" character.

1. Open up the character map.

2. Go to find.

3. Search for U 202E.

4. Copy character.

5. Rename trojan an in the following format -> trojan[RTLO]pdf.exe

 

温馨提示: 本文由Jm博客推荐,转载请保留链接: https://www.jmwww.net/SQL/11910.html