Ethical Hacking - GAINING ACCESS(20)
CLIENT SIDE ATTACKS - Spoofing backdoor extension
- Change the extension of the trojan from exe to a suitable one.
- Make the trojan even more trustable.
We will use an old trick using the "right to left overload" character.
1. Open up the character map.
2. Go to find.
3. Search for U+202E.
4. Copy character.
5. Rename trojan an in the following format -> trojan[RTLO]pdf.exe
相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。

浙公网安备 33010602011771号