Talk about the back door

xiaoxiao2021-03-06  41

Author: yyt_hac

Home: http://www.yythac.com

Email: Webmaster@ythac.com

With the development of computer technology and the popularity of the network, hacker technology has been known for more and more people, and many websites have also launched hackers.

A series of services such as training courses, VIP members, will inevitably cultivate a lot of hacker technology enthusiasts, while the back door is a tool for hackers.

It is inevitable that there will be more and more attention. At present, the speed of the new back door is also very fast. I have been in contact with the back door for a long time, and I have written some back door. Now I want to think now.

Talk about some views on the back door, if there is a wrong place, welcome to correct.

The first question I want to talk is to understand some concepts, that is, "Remote Control Software", "Trojan", "Back Door".

General "Remote Control Software" means software that is easy to install by remote management, such as pcanywhere, it

The feature is the software that the user is interested in installing, and its user is the user. But now some people also expand the meaning of "remote control software"

I am filled, I think the software with remote control functions is called remote control software. For example, some Trojans, the back door has a remote control function, and they also call them far.

Cheng control software.

"Trojan" is called "Trojan Horse", and its user is a hacker, and it is more precise to "hacker", it is mainly "hacker"

By deceiving users (including bundle, utilizing web pages, etc.) allows users to install a class of software in their system, main features

Remote control, pirate password, etc. The name of the Trojan pointed out its characteristics, that is, deceptive, software classification should not look at it

But it should be characterized by it. Now some Trojan developers don't like the Trojans I developed as "Trojan", but called "Remote Control

Software ". The reason is very simple," Trojan "is derogatory," remote control software "is commended, so you can understand, because after all

"Trojan" is also included in the "remote control software" expanded. But someone says that the Trojan it develop is a remote control software instead of

Trojan, this can't understand. Is the Trojan not to be said to you, but to see its characteristics. "Trojan" and regular remote control software

Don't lick it to make users unkno to his computer by spoofing way, it is not the user who wants to install it, and regular

Remote control software is the user's own intentional installation. Can you say "Ice" is not a Trojan? No, because it has the characteristics of Trojans. Trojan

It is also a reason why many people hate it, because it is always very painful to be deceived, especially those who have been deceived; many Trojans have a pirate code

Function, this is another reason why it hates it, so a high level of hackers don't charge with Trojan.

"Back door" is a class of software installed in order to facilitate access to the computer later in invading the computer.

If the level is relatively high, they invaded machines are some of the performance comparison servers, and these computers are more than

Higher, in order not to let the administrator discovery, this requires "back door" must be hidden, so the characteristics of the rear door are its concealedness. Trojan

Sexual is also important, but because the user who is installed with Trojans is not high, it is not so important that the back door is so important.

The difference between the back door and Trojans is that it pays more attention to hidden, but there is no deceptive, so its harm has no Trojan, reputation is in "remote control."

Software "and" Trojans ".

Through the above analysis, we can easily distinguish these three types of software. The latter door is a hacker tool. Its main use is still

In terms of illegal, it can be accepted as a malicious program, but it can't be said to be a virus, and the Trojan is different because they come out of its nature. Of course, all things have two sides, have a good role, there is a bad role, and the quality of the tool itself is an aspect, but the relationship is

The key is to see the people who use the tool, the knife can be used to kill people can also be used to save people, can't be used, because the knife can kill, the knife is not right, the key

It is better to see more or bad. The latter door is the same, it is undeniable that it should be more bad, but its destructive power is not big, and it also has

On the one hand, such as the latter, let everyone increase network security awareness, improve the national overall network security level, can increase the sale of anti-virus software,

You can also use it to control foreign machines to contribute to the motherland. Is it very exaggerated?

Let's talk about what kind of back door is a good back door? That is, what is the most important thing in the back?

Now many back door technology is open, there is a source code, so write a back door is not difficult, just learn to program, two stars

You can write a back door, which is also the cause of the new back door, but it is not easy to write a real back door.

Best. What kind of back door is the real back door? In fact, it can be found that the characteristics of the back door are its concealedness, so hidden

Sex back door is a real good back door. I have found that many people are saying how powerful, how much it is, how many of the latters

Is it difficult to uninstall? Discuss these meaningful? Only in the case of hidden, consider its function and ease of use, otherwise you are discovered, yours

The latter door is more, and it is easy to use, and it doesn't work. If you just want to find a powerful, easy to use the back door, I advise you to make

It's okay with a commercial remote control software. If you change the pcanywhere change to the version that can be installed on the command, it's strong enough.

Big, use it is convenient enough, it does not use the back door at all. It is even more difficult to uninstall, if I discovered my machine, I was installed in the back door.

, Don't you uninstall it? It is impossible to find that there is a root thorn in your meat without pulling it out. If you find your system

It was installed in the back door because it was difficult to uninstall it in your system, then I can only say 'I service You'.

So what regards the hidden in the back door? I think there are three aspects:

Start mode, existence method, and connection mode.

The start-up method is how to start the latter when the operating system starts, and now, most of the back doors are used to start items or plus.

The way the system service is easy to discover, and the starting method of the infection system file is more concealed.

There is a way to refer to the presence form of the operating system after the latter success is successful, and there are three main methods in the operating system: process, hidden

Processs and remote threads, processs and hidden processes are now easily discovered, and the remote thread is a more hidden way.

The connection method refers to how the user is connected to the client and the machine to establish a machine installed, thereby controlling the machine. open

The way the TCP port is too obvious. Fport can find that the UDP port is the same, and the data packets such as ICMP implement unconnected transmission is not very stable.

At present, port multiplexing techniques and reverse connecting technologies are better technologies, and they have their own strengths or two techniques.

If a latter can do it very well above, it is a real good back door, otherwise it can only be an entry.

Level back door.

So why should I write the back door?

First, write a good back door is a very challenging thing. After all, it involves many advanced programming technology, writing the back door to increase your understanding of the underlying operating system, greatly improve the programming level. People who work some of the work will have something to do with a certain stage.

Breakthrough, do some challenging things, such as mountaineers want to board the Mount Everest, the game athlete wants to swim, hacker programmers

Whatever I want to write a good back door.

Second, write the back door can improve your popularity in the black world.

Again, the back door of the write charge can also bring economic benefits.

Finally, although there is a lot of bad things, after all, it has some good uses.

Writing this article is because some people often discuss these problems in the process of chat, and they also see many people's views on these issues.

So I also wrote some of my opinions. I will discuss these questions in the future. I will show him this article.

This article may take some people. If you think that I am charging you, it may be that you are relatively low, because I respect

It is a huge hacker, not a hacker. If you think that the level is high but I still think that I am charging you, I welcome the criticism.

2005-2-24

转载请注明原文地址:https://www.9cbs.com/read-52940.html

New Post(0)