Imagine super hippo ~

xiaoxiao2021-03-06  41

GeForce20 (live interesting person) The strongest Trojan is currently I will be announced, wow haha ​​1. Trojan effective code should be a pure code rather than a DLL or other, then insert this code into the system Go in the process, become a thread, then destroy your own process. 2. When communicating, it is certainly not the port number that is not used by the system, and the port number that has been used, such as 80 ports .3. How to make yourself when you start it, you can't use the registry, I can't use INI files and bat files, it is best to add your code to the system executable file, and that, the program that is turned on, that is, you have to run in the program. When you rewrite its executable. 4. Take advantage of the SEH program, reaching your own code is not certain at any time, such as randomly taking a codon, the Trojan pure code said above should be One of the first instructions is any illegal instruction. When running to this command, it will enter our SEH program. At this time, the code before encrypting the current command should be used, and in the current instruction After the N-instructions are inserted into an illegal instruction, then skip to the next instruction of the last generated error, start running, then jump into our SEH program due to the illegal instructions last inserted, so repeated until When the entire code is executed, our code is almost completely encrypted, and it is of course a loop, and starts from the beginning, this, every time I enter our SEH program, it will first have run. The instructions are encrypted, and the following N should decrypt, then jump out of the run, the week, reunion. This will ensure that our code is changing, anti-virus wants to delete us according to the code characteristics, as if it is a bit difficult! 5. The next is the function of our Trojan to achieve. As the saying goes, we must see the master. Our Trojan must have the function of identify the owner, haha, for the machine with the camera, must be taken from the camera The avatar recognizes whether it is mm and whether it is ppmm, if two are in line, you have to automatically let her QQ plus us (Note: If there is no QQ on the machine, you should be able to download and install it, you may send MM application QQ number), but also let her automatically and our video, if she is talking to others, forcibly disconnecting their connections, if MM is to disconnect and our connection, automatically reconnect. If MM is in a live gas Head, throw it, then our Trojan is to use the beep () function, make a very harsh sound, forced her to put the camera's head. If MM wants to turn off the computer, our Trojan should You can use the AbortSystemShutdown () function to make it unable to shut down. And call beep () again. If MM is going to pull the wire, our Trojan should send a few words "I have used the camera to shoot your full body icon, and After image processing, synthesized a nude photo ... if you ... I just ... ". In the end, when we and MM video, she had to be white, if we ask her not to meet us, Trojans should be beep (). Note: If the owner is a man, or it is not a ppmm, we will do what we should do. ! Do you want to do it? But don't do too much. 6. There should be a lot of spatial scalability, such as plug-ins, more features.

转载请注明原文地址:https://www.9cbs.com/read-76040.html

New Post(0)