6. file ownership and permissions set free anonymous ---- ---- Windows keyloggers

File ownership and permissions

touch --help
cd Desktop
mkdir Folder
cd Folder
clear
touch Test1 Test2 Test3 Test4
ls
ls -l
用户   用户组权限
chown sec875:kali Test1
chown root:root Test2
clear
ls -l
cd Downloads
cd ..
ls
cd lscript
ls
ls -l
clear
cd ..
cd Desktop
clear
mkdir Bash
cd Bash
clear
echo "Hello World"
echo "linux Rocks" > bash
ls
mv bash bash.sh
ls
ls -l
./bash.sh
chmod +x bash.sh
ls
./bash.sh
nano bash.sh
hello world
clear
cd ..
ls
rm Bash
rm --help
man rm
rm -r Bash
rm -r Folder
chmod 777

Free anonymous settings

https://www.vpnbook.com/freevpn
sudo openvpn 复制粘贴文件名字25000
输入账号密码
duckduckgo.com     不会改变DNS信息 check for dns leaks
sudo openvpn 复制粘贴文件名字53
输入账号密码

Windows keyloggers

脚本 https://github.com/4w4k3/BeeLogger
sudo bash
cd Desktop
git clone URL地址
ls
cd BeeLogger/
ls
./install.sh
选择 win7 python2.7 
ls
python bee.py
关闭,打开一个新终端
sudo bash
cd Desktop
cd BeeLogger/
python bee.py
k    flash    word    excel  ppt    pdf   exe
需要Gmail账户,记录器发回信息

It is necessary to explain too much detail to show the real master of defense, the same as here.

We know that the red side keyloggers generated as a flash, word, excel, ppt, pdf, exe file is added to the message, and so on so that you hooked.

You will really understand the process, making their own start from nature, avoid the use of the most effective means to prevent the loss of their property.

Please do not blindly conclusion: over the details of the show, helping crime.

Do not premature to conclude that: You see things that are crimes he taught.

Please keep the red and blue against the development of thinking, and promote the healthy development of the security industry.

Make learning and communication network were also comply with safety laws, keeping the bottom line, do not cross-border. Learning needs, use their own drones, thank you.

On the contrary, the offender has already mastered the attack techniques. We just weak. Details with respect to the red team in terms of technology, greater assistance for the blue team and users.

A clear understanding of the whole technical details, defense from cyber attacks Characteristics.

Guess you like

Origin www.cnblogs.com/sec875/p/11295663.html