How to Make Trojans among others?
This is the most frequently asked question by netizens. There are also some scattered answers, but there are always few. So ainemo decided to collect the wisdom of everyone and write a topic about the next experience.Article. I hope you can speak more and improve this article to make some contributions to all Trojans. The objective is to protect personal PC security by allowing everyone to understand common trojans and scams.
1. bundling and spoofing. Bind the Trojan server and a game into a file and send it to someone else via QQ or email. After the server is running, you will see the gameProgramIf the trojan program is opened normally, it will not be noticed that the trojan program has been quietly running, which can be very confusing. In addition, even if someone reinstalls the system in the future, he may save the game you gave him.
2. This is a textbook-style old-fashioned deception. The method is as follows: Send the Trojan server directly to the other party and the other party runs without any response (a typical manifestation after the trojan is run). He said: "Why can't I open it!" You said, "Oh, no, the program is broken, right ?" Or, "Sorry, I sent an error !" Then, he sent the right things (normal games, photos, etc.) to him. After receiving the message, he was overjoyed and did not want to hear anything wrong with the thing just now.
3. QQ spoofing. Premise: you must first have a QQ number that does not belong to you. Then he used the number to send Trojans to his friends. Because he trusted the host of the stolen number, his friends would not hesitate to run the trojan program you sent to them.
4. Email spoofing. Similar to the third method, you can use an anonymous email tool to impersonate a friend or a large website or organization to send a trojan attachment to someone else. If someone else downloads and runs the attachment, the trojan will be launched.
5. Dangerous download points. This is a common method for vegetables mentioned by several friends later: (it is said that he has used this method to obtain thousands of bots) after breaking some download sites and downloading several software with a large volume of downloads, bind the trojan, and then quietly put it back for others to download. In this way, each time you increase the number of downloads, you will have an additional zombie. Or you can simply bind the Trojan horse to other software, and then publish the Trojan horse to major software download websites. They will not detect the virus, even if they cannot find the new Trojan horse I wrote, then... I don't need to say that there are at least two digits of meat opportunities.
6. Folder inertial click. After disguising a trojan file as a folder icon, put it in a folder, and set three or four empty folders on the outside. Many people attempt to pretend to be a folder Trojan due to continuous clicks, the trojan will run successfully.
7. Zip camouflage. This method is the latest. Bind a trojan together with a corrupted zip package (which can be made by yourself) and specify the bundled file as the zip icon, unless someone else looks at his suffix, it will be no different from the general damaged zip. I don't know that there are Trojans running quietly.
8. Upload the bundled Trojan horse in a briefcase or forum where attachments can be uploaded, and send the link to the victim.
9. webpage Trojans.