Manually create a Server Self-extract shift Backdoor

Source: Internet
Author: User

Manually create a Server Self-extract shift Backdoor

Most of the time we get a server, we will leave a backdoor program to facilitate the next entry.

The mainstream server is the shift backdoor, which also replaces the built-in sticky key of the server with our backdoor file.

Call method: Call the function by pressing Shift for five consecutive times.

If you are a server administrator and find that the 5-down shift button is not the sticky key shown in, your server will be infiltrated by others.

Now, let's go to the topic. Here, refer to the security net to teach you how to manually create a Server Self-extracting shift backdoor.

 

I,Create a new shift. bat batch processing content as follows
 

copy shift.exe %systemroot%\system32\sethc.exe /ycopy %systemroot%\system32\sethc.exe %systemroot%\system32\dllcache\sethc.exe /ycmd.exe

 


Slightly sensible, we can see that the intention of the second code is to copy shift.exeto sethc.exe and replace the system drive letter with the last cmd.exe under the system drive letter to call the cmd window.

 

The hacker animation editor's personal replacement Task Manager also directly redeployed the Task Manager (I .e., changed "cmd.exeto taskmgr.exe)

 

Ii. FutureAdd shift. bat to the compressed file

Right-click shift. bat-add it to the compressed file (tick the compressed file created in the Self-extracting format)-click Advanced-click Set password-then click OK-click the self-extracting option...

I don't want to hit it later. Let's see the following dynamic picture settings.

Click the shift.exe generated on the table and enter the password to complete the installation. Press shift to call the call.

If you do not understand the article, you can join our members of the Red/Black alliance to study. We believe that you are the best choice for us.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.