I know all the secrets in the USB flash drive.

Source: Internet
Author: User

Text/image: erratic

In June, This is a month filled with various tests. The College Entrance Examination has just ended, and other students and friends will begin the final examination. Today, most teachers have their own USB flash drives or mobile hard drives, and their courseware and materials are usually stored in USB flash drives or mobile hard drives. Of course, we also have a long-time examination paper on YY. That's right. Our goal in this issue is to test the instructor's USB flash drive. Of course, it is impossible to use this method. We need to use our own technology to scan the instructor's USB flash drive without knowing it.

How can I steal files from a USB flash drive? In fact, we still need to use Trojans, but such Trojans are neither Remote Control Trojans nor account theft Trojans, but file theft Trojans exclusive to mobile storage tools such as USB disks. These Trojans include "Flash hackers" and "USB flash disk thieves". However, these two Trojans only support USB flash disks. We do not support stealing files from mobile hard disks. This is of course not in line with our requirements, so we should use the all-round player "upan Porter.

After downloading the "udisc Porter" and running it (Version 2.2), its main interface appears. There are several options available on its interface:

Allow anonymous copy: This option must be selected. Otherwise, the file cannot be stolen from the USB flash drive.
Access mobile hard disk: select this option to steal files from the mobile hard disk. By default, this item is gray and is not selectable, because it can only be used after software is registered. I believe this should be difficult for us to cook.
Show the system tray icon: If you are directed at the exam in the instructor's USB flash drive, you must not select this option. Otherwise, the teacher can't help but double-click it with curiosity when looking at a huge USB flash drive icon in the lower right corner of the taskbar, so you are miserable. Don't get the exam, and you want to take the exam, huh, huh.
Open the folder after the copy is completed: it is of the same type as the one in the previous section, that is, there is no need to find the extraction type. How can we expose ourselves to food?

As for the "Automatic detaching of the USB flash drive after copying" and "prohibiting the use of mobile storage devices", these two functions are designed to make it easier for common users and are useless for the whole course of food, therefore, do not select.

Figure 1. Main Software Interface

OK. Let's make detailed settings to make the "upan Porter" Listen to us more. Click "go to detailed Settings" on the software interface ". The first is "define hotkey". We need to set a "outgoing call interface hotkey" for the "upan Porter" because we have disabled the "upan Porter" from displaying the icon at the system tray, once the "upan Porter" is minimized, we can no longer set it. So for the sake of insurance, you should specify a hotkey for it. The default hotkey of "upan Porter" is "Ctrl + AltU". We can change it to another one.

After setting the hotkey, let's take a look at the extended Setting section of "upan Porter:

"Automatic startup": This must be selected. In case the teacher restarts the machine, your previous work will not be wasted. In the future, there may be many unexpected good things.
"Do not display the interface at startup": Of course you should choose from. Do you want the teacher to appreciate the "udisc Porter" hidden in the system "?
"Allow copying the same disk again": select it. The more files you can steal, the better.
"Store software by suffix": to facilitate the collection of stolen files, this function also needs to be registered before use.
"Start scanning immediately after starting the software": Generally, the process of stealing files with the "upan Porter" is to first install the trojan in the system and monitor the USB flash drive device inserted in the system, the system starts to steal the files. If the system has inserted a USB flash drive before running the "upan Porter", the files in the USB flash drive cannot be stolen. This function is used to steal files from the USB flash drive immediately.

Figure 2. Software extension settings

Go to "monitoring status transition" and select "Comprehensive Monitoring ". Go to the "file path" setting, where "USB folder" does not need to be set, Trojan will automatically get it, and "Computer folder" is the location where the stolen files are saved. We can create a hidden folder in drive C, and then set "Computer folder" to this hidden folder to increase concealment.

Finally, we can specify the file type of software theft. Generally, the electronic papers are in doc format, xls and wps format. Therefore, we can select these three types. If you are not interested in the exam, you can select the jpg and bmp options. In addition, the software also supports custom file theft types, and can steal files in the USB flash drive based on keywords. After setting, click "Save settings. Return to the "upan Porter" Main Interface and click "close. In this way, the "upan Porter" will be hidden in the system, and the meeting will monitor the inserted mobile storage devices.

Figure 3. Custom file types

Of course, these operations must be completed before the teacher inserts a USB flash drive ...... Finally, I would like to remind you that although I have taught you how to steal files from a USB flash drive, I still hope you do not get a false good score. It is more important to be a good student with good faith.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.