A small note on the simulation experiment of the Trojan horse bundle in the practice of information security technology

A small note on the simulation experiment of the Trojan horse bundle in the practice of information security technology


Dingdu! Here is the compilation of Xiao Ah Woo's study course materials. A good memory is not as good as a bad pen. Today is also a day to make progress. Let's advance together!
Insert picture description here

Practice task description

Write a program (the development language is not limited), and the final release is required to be an exe file (other files can be attached, but you must double-click the exe to run), the program has a window interface, and there is 1 button on the interface. After clicking the button, the program is in the current directory Release an mp3 file (your favorite music), and call the system default player to play the music.

Realization process record

木马捆绑是把一个有界面的正常程序,和一个后门程序捆绑在一起从而制作一个木马。

The documents involved are as follows:

Insert picture description here

双击test.exe即可运行程序窗口。

Insert picture description here

界面上有1按钮Search,
单击按钮后程序即释放出一个mp3文件。

调用系统默认播放器播放音乐。

Insert picture description here

Insert picture description here

Ending!
More course knowledge learning records will come later!

就酱,嘎啦!

Insert picture description here

Note:
Life is diligent, nothing is gained.

Guess you like

Origin blog.csdn.net/qq_43543789/article/details/108742518