Today, I was very interested .. Listen to the pigeons on the Internet. The password is transmitted in plaintext .. Think of the anti-intrusion after the pigeon in the previous article .. This is the last article in the previous article .. It is difficult to analyze other people's pigeons .. Simply do it yourself .. Self .. Easy to analyze ..
First, introduce the software.
1. netlimiter 2 pro ===the main role is to view the connection of each process .. You can see the port opened by the process. The local and remote ports used for external connection. Of course, you can also limit traffic .. .. For details, go to development ..
2. Iris =========== I believe you will know that this is a famous sniffer when you go online and google it .. It does not need to be used .. Is to capture packets ..
3. iceSword ice blade =====don't tell me you don't have this classic tool .. I mainly use it to check hidden processes. File .. Registry key.
4. The gray pigeon [Version 2.03] ==== that's not much to say.
Take a look .. No pre-recruitment services .. I believe that more than 2000 of the systems are used .. So we will not discuss the pigeons that do not start services under 98 ..
Service 1.gif
Process port 2.gif
Then configure a pigeon server .. Because it is used for testing .. I will not adjust the service name ..
I am using the online method that many people use: FTP online, and the client's ip address is on the file/UpLoadFiles/NewsPhoto/> ServerConfiguration 3.gif
Then I run the server.
In icesword, iexplore.exe is red .. It indicates a hidden process ..