Changing extensions
If we look at the backdoor, or the Trojan that we've generated so far, all it has is an icon that represents a file that the target person is interested in. When it's executed, it shows a normal file. And, at the same time, it's going to execute our code in the background, which will allow us to hack the target computer, or do whatever we want. The only problem with this file is that if we look at the end of the file, we can see that it has a .exe
extension. In most cases, the target probably won't see the .exe
extension because Windows is configured to hide it, but if it's not hiding it, then it's obvious that this file is an executable because it ends with a .exe
extension. In this section, we are going to focus on how to spoof our Trojan and change it to something that corresponds to the file. If we're trying to make our backdoor look like a PDF, we can make it look like it has a .pdf
extension; if we're trying to make the file look like an image, we want to make its...