Ethical Hacking - GAINING ACCESS(20)

CLIENT SIDE ATTACKS - Spoofing backdoor extension

  • Change the extension of the trojan from exe to a suitable one.
  • Make the trojan even more trustable.

We will use an old trick using the "right to left overload" character.

1. Open up the character map.

2. Go to find.

3. Search for U+202E.

4. Copy character.

5. Rename trojan an in the following format -> trojan[RTLO]pdf.exe

 

你可能感兴趣的:(Ethical Hacking - GAINING ACCESS(20))