About the source program:
Anyone who downloads this program has the right to modify it, but the author of this software, Xu Changyou, has the final right of interpretation and reserves all rights to this software.
server directory: server
client directory: client
screen directory: Examples of loading remote screens for your reference
statement:
This software is free software. Its main purpose is to cooperate with the network administrator for remote monitoring. The author allows and encourages free dissemination, but it is prohibited to use it for commercial purposes or charge fees for any reason during the dissemination process.
At the same time, the author does not make any warranty for this software, and is not responsible for any system errors or data loss caused by this software.
As well as the resulting emotional entanglements and legal disputes, anyone who uses this software to maliciously invade other people's computers or networks will be responsible for the consequences.
The source program is for reference only, to help you fully understand Trojan horses and other network programs. It is definitely not for you to write Trojan horse programs. The source program was written before.
Whether it can be used in many places, I have not tried it one by one. The entire source program can be compiled in D4 and D5.
The new version of Netkey will not be made public for the time being. Please pay attention!
Apologize:
The Eastern Divine Key has been circulating on the Internet for a long time. I have received a large number of letters asking for help, but due to various reasons I was unable to reply in time or forgot to reply. I hereby apologize.
"Eastern God Key" (V1.0 Trial Version) Instructions for Use
Software function overview:
This software is mainly used for remote monitoring. Specific functions include:
1. Automatically track target machine screen changes;
2. Full simulation of mouse and keyboard input;
3. Record various password information: including power-on password, screen saver password, various shared resource passwords and absolute
Most of the password information that appears in the dialog box also provides keystroke recording function;
4. Obtain system information: including registered company, current user, system path, current display resolution,
Multiple system data such as physical and logical disk information;
5. Restrict system functions: including remote shutdown, remote computer restart, mouse lock, and registration lock
Table, prohibit automatic dialing and many other functional restrictions;
6. Remote file operations:
7. Registry operations: including browsing, adding, deleting, copying, renaming, and reading and writing key values
Wait for all registry operation functions;
8. Send message: send short messages to the target machine using four icons and six prompt buttons;
9. Communication: Chat with the monitored end in the form of a chat room.
This version tests normally under Windows 9X/NT/Me.
1. File list:
1. lock.exe: background monitoring program of the monitored terminal (run it once and it will be automatically installed and can be changed at will)
name).
2. Dongfangshenkey.exe: Monitoring terminal execution program, used to monitor remote computers and configure server programs.
2. Preparation work:
"Oriental God Key" (V1.0 trial version) is a network tool based on TCP/IP protocol and WINDOWS operating system, so you should first ensure that the protocol has been installed and the network connection is correct, and then configure the server program
(If no configuration is required, the default settings will be used) and run the server-side monitoring program on the computer to be monitored.
3. Upgrade method:
Go to http://www.yousoft.net/ to download the upgrade program.
4. Brief description of each module:
After installing the server-side monitoring program, you can run the client program to monitor the remote computer. The functions of each module of the client execution program are as follows:
1. "Add Host": Add the monitored IP address to the host list.
2. "Delete Host": Delete the monitored IP address from the host list.
3. "View Screen": View the screen of the monitored end. [None yet]
4. "Screen Control": Control the other party's screen.
5. "Communication": peer-to-peer chat room, also known as the legendary two-person world.
6. "Automatic search": Search for computers with Oriental God Key installed in the specified subnet. (For example, if you want to search
Computers in the network segment with IP addresses 210.37.62.1 to 210.37.62.255 should set the starting domain
Set to 210.37.62, and set the start address and end address to 1 and 255 respectively).
5. File manager operation instructions:
You can delete any of the other party's files, create shares, and share any of other people's information.
6. Main commands of command console:
1. Password commands: system information and passwords, historical passwords, keystroke records;
2. System commands: capture screen, send information, process management, window management;
3. Control commands: mouse control, system control, other controls (such as locking the registry, etc.);
4. Network commands: create shares, delete shares, view network information;
5. File commands: This function is not available yet:
6. Registry reading and writing: Registry key value reading, writing, renaming, primary key browsing, reading, writing, and renaming;
7. Setting commands: change wallpaper, change computer name.
7. Usage skills:
1. When using the network share creation command, if you do not want others to see the newly created share name,
You can add a $ sign after the share name. When you want to browse, just type \ +[machine name]+[share name (including $ sign)] in the address bar of IE or the run dialog box of the start menu.
8. Frequently Asked Questions:
1. The installation is unsuccessful. This problem is usually caused by incorrect installation or setting of the TCP/IP protocol.
2. When the monitored terminal starts up or when connecting to the monitoring terminal, a connection establishment dialog box pops up. This problem is due to the automatic dialing attribute set by the system. You can disable automatic dialing by customizing the server program before installation.
3. Can connect but does not respond, usually caused by network congestion, because there are flaws in the design of the 1.0 trial version, otherwise an error message may appear on the monitored end.
4. The wallpaper change command is invalid. There are many possibilities for this problem. The most common reason is that the desktop of the monitored terminal is set to view on the WEB page.
6. The power-on password is incorrect. Because the CMOS password is one-way encoding, the encoded password is irreversible and not unique. The password calculated through exhaustive calculation may not match the original password, but it is also a valid password.
Chairman Mao said that without investigation, you have no right to speak, so don't jump to conclusions without trying it.
7. Using the view screen command has no effect.
9. Acknowledgments:
Due to many factors such as development conditions, test environment, and development time, many functions have not been repeatedly verified. Moreover, the author is neither a genius nor an all-rounder. Although he wants to achieve some functions, he is unable to achieve them.
Thank you for your use. I would like to express my gratitude and apologize to everyone for my personal qualifications.
\|///
\ - - //
( @ @ )
+---------------------oOOoo-(?)ooOOo---------------------+
| |
| If you find any problems or have new ideas during use, please contact me in time: |
| E-MAIL: [email protected] |
| OICQ: 4529818 |
| URL: http://www.yousoft.net/ |
| Ooooo Xu Changyou 2000.04.01 |
+-----------------------ooooO--( )--------------------- +
( ) )|/
|( (_/
_)