A war of contradictions makes it easy to bundle and kill Trojans

Source: Internet
Author: User

Trojan attacks can be said to be a type of behavior with a low technical level and a high level of harm in all hacker actions. In the trojan attack, bundling and disguise are the easiest way to get cheated. It is called a horse in sheepskin ". Today, we are going to work with you to find out what we know!

I. File bundling

Because the file header pattern changes after a normal file is bound with a Trojan, as long as we try to see whether the file header is normal, we can identify whether the trojan is bound! Here we recommend that you use the MT bundle genie.

Run the program, click the "Browse" button on the main interface, add the file to be detected, and click the "analysis" button to display the analysis information, A moment later, we can check the number of "Number of executable headers". If the number is one, it means no other files are bound. If there are more than one, it is bound and cannot be run at will.

Ii. Finding out a trojan is still clear to me

I believe many authors have encountered such a problem. They clearly know that the file is bound with a Trojan, but the host file of the Trojan is urgently needed. What should I do? Don't you just jump into the trap!

Here we will ask our second assistant, which is only 6 KBFearless Bound File Detector. This is a green software. You don't have to look at it as small, but its functionality is not weak. Run the software and click "…" next to the "target" column on the main interface. Click the "scan file" button to add the file to be processed, scan the file, find the parasitic data, and then click "Clean file". A warning window is displayed, click "yes" to start cleanup. A moment later, you will be prompted for cleanup. In addition to the EXE file bundle, this software can effectively clear non-EXE formats, including BMP, TXT, and other formats.

So far, have we found a horse in sheepskin! In fact, to prevent Trojans, in addition to technical attention, you must also develop the habit of downloading software on a regular website as much as possible, rather than opening unknown files. You must also learn the relevant security knowledge, such as html "> Logging.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.