黑客如何使用虚假Windows开屏进行钓鱼
作者:FancyPig | 发布时间: | 更新时间:
相关阅读
data-postsbox="{"id":33347,"title":"如何通过Excel表格进行远控? | 反弹Shell技巧","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2023/03/20230302021746242.png","cover_video":"https://v.pigsec.cn/remotely%20control%20any%20PC%20with%20an%20Excel%20sheet%21__ts.m3u8","views":2896,"comment_count":7,"category":"knowledge","is_forum_post":false}">{"id":33347,"title":"如何通过Excel表格进行远控? | 反弹Shell技巧","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2023/03/20230302021746242.png","cover_video":"https://v.pigsec.cn/remotely%20control%20any%20PC%20with%20an%20Excel%20sheet%21__ts.m3u8","views":2896,"comment_count":7,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":29124,"title":"如何nc远程控制任何Windows电脑","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/12/20221224022244542.png","cover_video":"https://v.pigsec.cn/Remotely%20Control%20Any%20PC%20in%204%20mins%2059%20seconds_ts.m3u8","views":3175,"comment_count":6,"category":"knowledge","is_forum_post":false}">{"id":29124,"title":"如何nc远程控制任何Windows电脑","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/12/20221224022244542.png","cover_video":"https://v.pigsec.cn/Remotely%20Control%20Any%20PC%20in%204%20mins%2059%20seconds_ts.m3u8","views":3175,"comment_count":6,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":28771,"title":"用这个简单的工具远程控制任何电脑!","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/12/20221218021041471.png","cover_video":"https://v.pigsec.cn/Remotely%20Control%20Any%20PC%20With%20This%20Simple%20Tool%21_ts.m3u8","views":4276,"comment_count":20,"category":"knowledge","is_forum_post":false}">{"id":28771,"title":"用这个简单的工具远程控制任何电脑!","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/12/20221218021041471.png","cover_video":"https://v.pigsec.cn/Remotely%20Control%20Any%20PC%20With%20This%20Simple%20Tool%21_ts.m3u8","views":4276,"comment_count":20,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":22881,"title":"黑客如何通过一个bat文件控制整台计算机","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":4835,"comment_count":14,"category":"knowledge","is_forum_post":false}">{"id":22881,"title":"黑客如何通过一个bat文件控制整台计算机","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":4835,"comment_count":14,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":12044,"title":"如何通过一个exe文件远程控制整台计算机?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":4428,"comment_count":16,"category":"knowledge","is_forum_post":false}">{"id":12044,"title":"如何通过一个exe文件远程控制整台计算机?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":4428,"comment_count":16,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":11280,"title":"Metasploit框架远程控制入侵手机教程","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":6128,"comment_count":296,"category":"knowledge","is_forum_post":false}">{"id":11280,"title":"Metasploit框架远程控制入侵手机教程","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":6128,"comment_count":296,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":8451,"title":"如何通过发送一个PDF文件 远程控制整台计算机?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5134,"comment_count":18,"category":"knowledge","is_forum_post":false}">{"id":8451,"title":"如何通过发送一个PDF文件 远程控制整台计算机?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5134,"comment_count":18,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":6757,"title":"黑客是如何远程控制一台电脑/服务器的?反弹shell了解一下!","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5793,"comment_count":7,"category":"cybersecurity","is_forum_post":false}">{"id":6757,"title":"黑客是如何远程控制一台电脑/服务器的?反弹shell了解一下!","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5793,"comment_count":7,"category":"cybersecurity","is_forum_post":false}
视频讲解
本期视频,我们将围绕黑客的视角,使用C#编写的开源项目,讲解黑客在后渗透阶段,如果远程控制到了Windows电脑,如何进一步获取到相关凭据,扩大战果。这里bitsadmin的fakelogonscreen是一个很有参考意义的项目……
相关资料
- Github开源项目 https://github.com/bitsadmin/fakelogonscreen