Atitit. Principles, confidentiality, overview, and defense of Trojan viruses, and atitit confidentiality
Atitit. Principles, confidentiality, overview, and defense of Trojan viruses
1. timed screenshot Trojan 1
1.1. QQ chat and chat Trojan 1
2. Document Trojan 1
3. method 2
4. Remote trojan 2
5. Vulnerability trojan 2
6. Virus Trojan hiding Mechanism 2
7. self-replication technology 3
8. Trojan virus free 3
9. Other Trojan viruses 3
9.1. Call of Gui interface 3
9.2. Registry programming 4
9.3. service-related programming 4
9.4. Process and thread 4
9.5. Operation Window 4
9.6. Virus Infection technology 4
9.7. self-starting Technology of malicious programs 4
10. Trojan shelling 4
10.1. Scanner sniffing, 4
1.
Timed screenshot Trojan
Principles and prevention of regular screenshot recording Trojans in Atitit
1.1.
QQ chat and chat Trojan
2.
Document Trojan
3.
How viruses and Trojans are triggered
Atitit pattern. docx
4.
Remote Trojan
Atitit trojan virus webftp.docx
Atitit trojan virus webshell's Principle and Design .docx
Atitit. java http Proxy atiHttpProxy damama .docx
Atitit.trojan virus websql.docx
Atitit image Trojan and remote interface monitoring common api standardization v2 q216.docx
5.
Vulnerability Trojan
Atitit. Xss troubleshooting and application xsstrojan .docx
6.
Hiding viruses and Trojans
The hiding mechanism of atitit virus Trojan and the probe formula .docx
Chapter 2 Trojan Hiding Technology Analysis
4.1 hiding technology-Registry Startup
4.1.1 test the Registry loading Trojan door
4.1.2 door Trojan program analysis
4.1.3 defense against loading a registry Trojan
4.2 hiding technology-service-level Trojan
4.2.1 Test Service-level Trojan svchost
4.2.2 svchost Trojan program analysis
4.2.3 service-level Trojan program Prevention
4.3 hiding technology-process injection Trojan
4.3.1 testing process injection Trojan inject
4.3.2 inject injection Trojan program analysis
4.3.3 prevention of inject injection Trojan
4.4 hiding technology-kernel-level rootkit
7.
Self-replication technology
Atitit.virtio self-replication technology .docx
Atitti. MRU Trojan .docx
8.
Trojan-Free virus removal
Principle of eliminating atitit Trojan viruses --- use of sikuli .docx
9.
Other Trojan viruses
Principle of atitit image Trojan. attilax constructor. docx
9.1.
Gui interface call
Simulate mouse and keyboard operations
9.2.
Registry Programming9.3.
Service-related programming9.4.
Processes and threads9.5.
Operation window9.6.
Virus Infection Technology9.7.
Self-starting Technology of malicious programs10.
Shelling of Trojans10.1.
ScannerSniffer,
References
C hacker programming secrets and prevention (version 2nd) Hacker defense practice essential hacker technology getting started tutorial Computer Security computer hacker getting started tutorial books Trojan defense technology written by science and education Studio
Trojan technology secrets and defense (...) [Overview _ book reviews _ online reading]-Dangdang .html
Author: nickname: old wow's paw (full name: Attilax Akbar Al Rapanui Attila Akba Arla Panui)
Chinese name: atira (iron), EMAIL: 1466519819@qq.com
Reprinted please indicate Source: http://www.cnblogs.com/attilax/
Atiend