Manually create a Server Self-extract shift Backdoor
Most of the time we get a server, we will leave a backdoor program to facilitate the next entry.
The mainstream server is the shift backdoor, which also replaces the built-in sticky key of the server with our backdoor file.
Call method: Call the function by pressing Shift for five consecutive times.
If you are a server administrator and find that the 5-down shift button is not the sticky key shown in, your server will be infiltrated by others.
Now, let's go to the topic. Here, refer to the security net to teach you how to manually create a Server Self-extracting shift backdoor.
I,Create a new shift. bat batch processing content as follows
copy shift.exe %systemroot%\system32\sethc.exe /ycopy %systemroot%\system32\sethc.exe %systemroot%\system32\dllcache\sethc.exe /ycmd.exe
Slightly sensible, we can see that the intention of the second code is to copy shift.exeto sethc.exe and replace the system drive letter with the last cmd.exe under the system drive letter to call the cmd window.
The hacker animation editor's personal replacement Task Manager also directly redeployed the Task Manager (I .e., changed "cmd.exeto taskmgr.exe)
Ii. FutureAdd shift. bat to the compressed file
Right-click shift. bat-add it to the compressed file (tick the compressed file created in the Self-extracting format)-click Advanced-click Set password-then click OK-click the self-extracting option...
I don't want to hit it later. Let's see the following dynamic picture settings.
Click the shift.exe generated on the table and enter the password to complete the installation. Press shift to call the call.
If you do not understand the article, you can join our members of the Red/Black alliance to study. We believe that you are the best choice for us.