First, the concept
- Control side: run the attacker's computer, responsible for controlling other broiler;
- Controlled end: the need to build, run on the broiler, Trojan
Second, the use of remote control tools remote control Bin
Step1: Open Kill.exe, click System Settings, modify the listening port 9999, set the communication password;
Step2: Open ./Plugins/hfs2_3b287/hfs.exe, will remove all things virtual files in the directory;
Step3: Right-add files to add into Consys21.dll; click to access the browser.
Step4: copy Consys21.dll address, open the service generates kill.exe, according to the picture, and finally clicks generated.
Step5: The generated programs run in Windows.
At this point, you can control the target Windows system! !