Many of my friends sent me a shift backdoor, with image hijacking, you can press shift 5, and then enter the password. 5. shift does not close, and right-click the box to the bottom right corner of the box... the premise is to run p processing or reg first. This method is better than X .. the Registry is as follows: WindowsRegistryEditorVersion5.00 [HKEY_LOCAL_MACHIN
Many of my friends sent me a shift backdoor, with image hijacking, you can press shift 5, and then enter the password.
5 shift → don't close → right-click the box and right-click it to the bottom right corner of the box...
The premise is to run p processing or reg first. This method is better than X ..
The Registry is as follows:
Windows RegisTrY Editor Version 5.00
[HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File ExeCutIon Options \SetHc.ExE]
"Debugger" = "C: \ www.xxxx.cn.exe" information from: http://www.3ast.com.cn
The path of this exe is: c: \ www.xxxx.cn.exe hacker
----------------------------------------------------- The following are security settings --------------------------- hackers
Know the above principle: You can set security ....
Shift down to 5 on the server, and remove all the check marks from the output settings.
Delete all files. Add the everyone setting to reject all objects.
C: \ WINDOWS \ system32 and C: \ WINDOWS \ system32 \ dllcachesethc.exe
Modify the Registry permission.
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ sethc.exe