Trojan attack
Trojan attack
Trojan Attack
A trojan is a program that is capable of giving hackers control over the attacked pc.
The most common features of trojan are:
> Capture a screen shot of the computer.
> Record all your key strokes and send them to the hacker.
> Use your pc as a bridge to do other hacking related activities.
> Can lock you Keyboard and mouse activities.
/Now how many times have you double clicked on a file that someone has sent you and nothing happens ?
/Weird isn\'t it.
Yeah there is a greater possibility that you have just Zapped yourself with a trojan.
We are going to look at a popular Trojan by the name of Netbus.
A trojan consist of two parts:
1.The Server which get installed to the target.
2.And the client which is used by the hacker to connect to your system.
Now to be able to do this you need to get the Victim to install the trojan by not being aware.
What cool is that you can link your trojan with another executable file.
This is used to limite the awareness on the victim.
Think of this as .\"Cooldrink + Cynide(poison)=poisonedCooldrink\"
The victim would drink the mixture without being aware but in a couple of minutes bang the victim is dead.
Same as here in Trojan attack.
The hacker would combine the trojan with an unsuspecting program mostly games.Using the jioner utility
e.g. Netbus + GalacticHacker(Game)=Contaminated GalacticHacker
(0.014 Mb) + (1.3 Mb) = (1.314 Mb)
Combination of two executable files to get one executable.
Notice the change in the size of the Contiminated Game.
Once the targeted victim double clicks the contaminated Game the trojan will get installed on the system
without the victim noticing it.
and the Game get installed normally without any problems.
Now the victim has just intalled a Server to his system without being suspecious.
Once the trojan get installed it will send the messege to the sender notifying about the:
>The Victims I.P
>If the victim is online
>And what is the victim\'s user name
Now what you can do is use the client to have access to the victims pc.
you can be able to download netbus at:
http://www.all-internet-security.com
ghost 17 years ago
great, something we already knew about trojans. if youd mentioned the binary injection to link the trojan or alternative intrusion methods to social engineering, then it wouldve been good. maybe even polymorphism. but every computer user should already know this. rated poor
SySTeM 17 years ago
Lol, most trojans, unless self-coded, or opensource, normally have a backdoor in the server.exe file, which sets your pc up with the trojan too, so other people can do shit to your pc, while you do shit to others, so, in my opinion, trojans can go suck dick.:angry:
ghost 17 years ago
Thanks this was a great informative article
fuck the haters they are blatently noobs who dont understand this article!
ghost 17 years ago
yea.. your "noobs" are the admins to the site and the critics.. congratulations, you insulted the admins :P
korg 17 years ago
Waste of space and I agree with system on this on! Trojans blow ass > netbus is detected by every A/V program out there.
ghost 17 years ago
@spyware, i was making a point about the lack of any interesting detail? @asilverperson… lol youre joking right?
spyware 17 years ago
Mr_Noob, I was commenting the article, not your comment (which provided more in-depth knowledge than this whole thing by the way).
ap101 17 years ago
ya Trojans are fucking lame, unless you make your own ;), oh ya and now for the article, its utter crap, and should be removed and burned…ok maybe not burning…ummmm I'm going to shut up, but to drive home a already made point, this article sucks. :right:
ghost 17 years ago
I actually learned more from THIS than I did from your stupid fucking waste of space. Your article should be entitled: "You're the moron that opened a trojan w/o using common sense." Then, MAYBE, it would get some positive responses. As it is… define trojans, mention splicing programs, and be done with it.
southafrica1 14 years ago
In your article you had some formulas such as: "Cooldrink + Cynide(poison)=poisonedCooldrink" and "Netbus + GalacticHacker(Game)=Contaminated GalacticHacker" well heres another one for you: "An article + utterCrap= an UtterlyCrappyArticle":)