随笔分类 -  学问

上一页 1 ··· 4 5 6 7 8 9 10 11 12 13 下一页
摘要:WHAT IS A WEBSITE Computer with OS and some servers. Apache, MySQL ...etc. Cotains web application. PHP, Python ...etc. Web application is executed he 阅读全文
posted @ 2019-10-19 21:03 晨风_Eric 阅读(138) 评论(0) 推荐(0)
摘要:Converting Python Programs to Linux Executables Note: You can not execute the program on Linux by double click. Install the PyInstaller. Covert the Py 阅读全文
posted @ 2019-10-17 22:34 晨风_Eric 阅读(108) 评论(0) 推荐(0)
摘要:Convert Python Programs to OS X Executables https://files.pythonhosted.org/packages/4a/08/6ca123073af4ebc4c5488a5bc8a010ac57aa39ce4d3c8a931ad504de4185 阅读全文
posted @ 2019-10-15 21:58 晨风_Eric 阅读(148) 评论(0) 推荐(0)
摘要:Spoofing File Extention - A trick. Use the Kali Linux Program - Characters 1. Open the program. 2. Find Right-to-left Override. 3. Copy Character and 阅读全文
posted @ 2019-10-13 17:21 晨风_Eric 阅读(104) 评论(0) 推荐(0)
摘要:Adding Icons to Generated Executables Prepare a proper icon file. https://www.iconfinder.com/ Convert the downloaded png file to an icon file. https:/ 阅读全文
posted @ 2019-10-13 16:40 晨风_Eric 阅读(113) 评论(0) 推荐(0)
摘要:BYPASSING ANTI-VIRUS PROGRAMS AV programs detect viruses based on: 1. Code - compare files to huge databases of signatures. ->Use own code, obfuscatio 阅读全文
posted @ 2019-10-13 16:13 晨风_Eric 阅读(368) 评论(0) 推荐(0)
摘要:DOWNLOAD & EXECUTE PAYLOAD A generic executable that downloads & executes files. Disadvantages: User needs internet connection. Files have to be uploa 阅读全文
posted @ 2019-10-13 15:35 晨风_Eric 阅读(164) 评论(0) 推荐(0)
摘要:TROJANS A trojan is a file that looks and functions as a normal file(image, pdf, song ..etc). When executed: 1. Opens the normal file that the user ex 阅读全文
posted @ 2019-10-13 14:11 晨风_Eric 阅读(136) 评论(0) 推荐(0)
摘要:Polish the Python code by adding the become_persistent function. Convert to Windows executable file. Execute the reverse_backdoor file on the victim W 阅读全文
posted @ 2019-10-13 11:43 晨风_Eric 阅读(215) 评论(0) 推荐(0)
摘要:PRESISTENCE Persistence programs start when the system starts. Backdoors -> maintain our access. Keylogger -> spy on target. Reports -> send report on 阅读全文
posted @ 2019-10-09 22:26 晨风_Eric 阅读(149) 评论(0) 推荐(0)
摘要:PACKAGING FOR WINDOWS FROM LINUX For best results package the program from the same OS as the target. EG if the target is Windows then package the pro 阅读全文
posted @ 2019-10-08 22:34 晨风_Eric 阅读(170) 评论(0) 推荐(0)
摘要:PACKAGING Convert python program into an executable that: Packages all program files into a single executable. Works without a python interpreter. Get 阅读全文
posted @ 2019-10-07 21:14 晨风_Eric 阅读(169) 评论(0) 推荐(0)
摘要:Cross-platform hacking All programs we wrote are pure python programs They do not rely on OS-specific resources. Result: They work on any OS with a py 阅读全文
posted @ 2019-10-07 12:04 晨风_Eric 阅读(144) 评论(0) 推荐(0)
摘要:Handling Errors: If the client or server crashes, the connection will be lost. Backdoor crashes if: An incorrect command is sent. The correct command 阅读全文
posted @ 2019-10-07 11:48 晨风_Eric 阅读(131) 评论(0) 推荐(0)
摘要:File Upload: A file is a series of characters. Uploading a file is the opposite of downloading a file. Therefore to transfer a file we need to: 1. Rea 阅读全文
posted @ 2019-10-07 10:49 晨风_Eric 阅读(229) 评论(0) 推荐(0)
摘要:File Download: A file is a series of characters. Therefore to transfer a file we need to: 1. Read the file as a sequence of characters. 2. Send this s 阅读全文
posted @ 2019-10-07 09:45 晨风_Eric 阅读(189) 评论(0) 推荐(0)
摘要:REVERSE_BACKDOOR - cd command Access file system: cd command changes current working directory. It has 2 behaviours: cd -> shows current working direc 阅读全文
posted @ 2019-10-06 23:05 晨风_Eric 阅读(125) 评论(0) 推荐(0)
摘要:BACKDOORS Sockets Problem: TCP is stream-based. Difficult to identify the end of message/batch. Solution: Make sure the message is well defined. Imple 阅读全文
posted @ 2019-10-06 22:01 晨风_Eric 阅读(158) 评论(0) 推荐(0)
摘要:Refactoring - Creating a Listener Class Creating a Backdoor class: 阅读全文
posted @ 2019-10-05 17:18 晨风_Eric 阅读(115) 评论(0) 推荐(0)
摘要:REVERSE_BACKDOOR Access file system. Execute system commands. Download files. Upload files. Persistence. BACKDOORS An interactive program gives access 阅读全文
posted @ 2019-10-05 16:18 晨风_Eric 阅读(197) 评论(0) 推荐(0)

上一页 1 ··· 4 5 6 7 8 9 10 11 12 13 下一页