Remote control (remote control Bin)

First, the concept

  • Control side: run the attacker's computer, responsible for controlling other broiler;
  • Controlled end: the need to build, run on the broiler, Trojan

Second, the use of remote control tools remote control Bin

  Step1: Open Kill.exe, click System Settings, modify the listening port 9999, set the communication password;

  

   Step2: Open ./Plugins/hfs2_3b287/hfs.exe, will remove all things virtual files in the directory;

  

   Step3: Right-add files to add into Consys21.dll; click to access the browser.

  

  

   Step4: copy Consys21.dll address, open the service generates kill.exe, according to the picture, and finally clicks generated.

  

   Step5: The generated programs run in Windows.

  

 At this point, you can control the target Windows system! !

Guess you like

Origin www.cnblogs.com/yuanshu/p/11600497.html