Description: 木马,也称特伊洛木马,名称源于古希腊的特伊洛马神话,是一种远程控制软件。现在网络上流行的木马软件基本都是客户机/服务器模式也就是所谓的C/S结构,目前也有一些开始向B/S结构转变,在这里暂且不对B/S结构进行详谈,本文主要介绍C/S结构其原理就是在本机直接启动运行的程序拥有与使用者相同的权限。因此如果能够启动服务器端(即被攻击的计算机)的服务器程序,就可以使用相应的客户端工具客户程序直接控制它了。下面来谈谈如何用VB来实现它。
-Trojan, also known as Trojan Teyiluo name from the ancient Greek myth of campaigning Lockheed Martin is a remote control software. Network now popular on the Trojan software is the basic client/server model is the so-called C/S structure, There are also some began to B/S structure, in the time being wrong B/S structure in detail This paper introduces the C/S structure of its tenets is directly in the machine up and running with the procedures for users with the same authority. So if we can start the server side (ie attacks on the computer) server, we can use the corresponding client tools clients direct control of it. Now to talk about how to use VB to achieve it. Platform: |
Size: 2048 |
Author:longyi |
Hits:
Description: VB写的极好的远程控制程序,功能之强可以和国产木马冰河相比-VB wrote the excellent remote control procedures, functions and strong domestic Trojan can be compared to the last ice age Platform: |
Size: 168960 |
Author:拉拉 |
Hits:
Description: 我知道很多人和我一样初学很辛苦所以我收集了这个木马生成技术的样本源码供大家学习-I know that many people and I like learning so I tried very, very hard to collect the samples of Trojan Generation source for everyone to learn Platform: |
Size: 110592 |
Author:董浩 |
Hits:
Description: vb开发的一个木马演示程序 了解木马的原理-vb developed a Trojan horse demo program to understand the principles of Platform: |
Size: 59392 |
Author:hh |
Hits:
Description: VB快速端口扫描器的源代码,能快速扫描计算机或局域网中所有存在安全隐患的端口。程序中附带特洛伊和后门程序信息的数据库,主要特色是扫描速度快,扫描32,000个端口仅仅需要一分钟不到。你可以更新数据库中的特洛伊和后门程序信息以便进行比对和查找可疑打开的端口。程序代码还有一些比较好的IP转换为域名以及互相转换的函数,对VB网络编程的朋友有一定参考价值。-Fast port scanner VB source code, can quickly scan your computer or local area network security risks exist in all the ports. Proceedings incidental to backdoor Trojan and information database, the main features of the scanning speed, scan 32,000 ports only need less than a minute. You can update the database of Troy and the back door in order to process the information to compare and find suspicious open ports. Some code is converted to a better domain name and IP conversion function with each other on network programming VB friends have a certain reference value. Platform: |
Size: 147456 |
Author:Rhode |
Hits: