Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Trojan attack


Trojan attack

By ghostghost | 6490 Reads |
0     0

Trojan Attack


A trojan is a program that is capable of giving hackers control over the attacked pc.

The most common features of trojan are:
> Capture a screen shot of the computer.
> Record all your key strokes and send them to the hacker.
> Use your pc as a bridge to do other hacking related activities.
> Can lock you Keyboard and mouse activities.

/Now how many times have you double clicked on a file that someone has sent you and nothing happens ?
/Weird isn\'t it.

Yeah there is a greater possibility that you have just Zapped yourself with a trojan.

We are going to look at a popular Trojan by the name of Netbus.
A trojan consist of two parts:

1.The Server which get installed to the target.
2.And the client which is used by the hacker to connect to your system.

Now to be able to do this you need to get the Victim to install the trojan by not being aware.
What cool is that you can link your trojan with another executable file.
This is used to limite the awareness on the victim.

Think of this as .\"Cooldrink + Cynide(poison)=poisonedCooldrink\"

The victim would drink the mixture without being aware but in a couple of minutes bang the victim is dead.

Same as here in Trojan attack.

The hacker would combine the trojan with an unsuspecting program mostly games.Using the jioner utility
e.g. Netbus + GalacticHacker(Game)=Contaminated GalacticHacker
    (0.014 Mb) +    (1.3 Mb)	  = (1.314 Mb)
Combination of two executable files to get one executable.

Notice the change in the size of the Contiminated Game.

Once the targeted victim double clicks the contaminated Game the trojan will get installed on the system
without the victim noticing it.
and the Game get installed normally without any problems.
Now the victim has just intalled a Server to his system without being suspecious.

Once the trojan get installed it will send the messege to the sender notifying  about the:
>The Victims I.P
>If the victim is online
>And what is the victim\'s user name

Now what you can do is use the client to have access to the victims pc.

you can be able to download netbus at:
http://www.all-internet-security.com

Comments
ghost's avatar
ghost 17 years ago

just some basics what happens if you click twice on a trojan. Nothing new… duh?

ghost's avatar
ghost 17 years ago

I'm a bit confused on why you wrote this article :P

ghost's avatar
ghost 17 years ago

im confused as to why it was accepted

ghost's avatar
ghost 17 years ago

great, something we already knew about trojans. if youd mentioned the binary injection to link the trojan or alternative intrusion methods to social engineering, then it wouldve been good. maybe even polymorphism. but every computer user should already know this. rated poor

spyware's avatar
spyware 17 years ago

Funny how some people can use so many words without actually saying anything.

SySTeM's avatar
SySTeM 17 years ago

Lol, most trojans, unless self-coded, or opensource, normally have a backdoor in the server.exe file, which sets your pc up with the trojan too, so other people can do shit to your pc, while you do shit to others, so, in my opinion, trojans can go suck dick.:angry:

richohealey's avatar
richohealey 17 years ago

…….who the fuck accepted this?!

ghost's avatar
ghost 17 years ago

Thanks this was a great informative article

fuck the haters they are blatently noobs who dont understand this article!

ghost's avatar
ghost 17 years ago

yea.. your "noobs" are the admins to the site and the critics.. congratulations, you insulted the admins :P

korg's avatar
korg 17 years ago

Waste of space and I agree with system on this on! Trojans blow ass > netbus is detected by every A/V program out there.

ghost's avatar
ghost 17 years ago

asilvermtzion: rofl dude. Sarcasm?

ghost's avatar
ghost 17 years ago

@spyware, i was making a point about the lack of any interesting detail? @asilverperson… lol youre joking right?

spyware's avatar
spyware 17 years ago

Mr_Noob, I was commenting the article, not your comment (which provided more in-depth knowledge than this whole thing by the way).

ghost's avatar
ghost 17 years ago

oh ok fair enough :) twas because you posted right after me lol

Uber0n's avatar
Uber0n 17 years ago

@korg: Backdoors can be damn fun, and if you code your own the AV won't detect it ;)

korg's avatar
korg 17 years ago

@Uber0n I'm aware of self coding, but premade shit like netbus are bullshit. That's what I mean.

ap101's avatar
ap101 17 years ago

ya Trojans are fucking lame, unless you make your own ;), oh ya and now for the article, its utter crap, and should be removed and burned…ok maybe not burning…ummmm I'm going to shut up, but to drive home a already made point, this article sucks. :right:

ghost's avatar
ghost 17 years ago

I actually learned more from THIS than I did from your stupid fucking waste of space. Your article should be entitled: "You're the moron that opened a trojan w/o using common sense." Then, MAYBE, it would get some positive responses. As it is… define trojans, mention splicing programs, and be done with it.

southafrica1's avatar
southafrica1 14 years ago

In your article you had some formulas such as: "Cooldrink + Cynide(poison)=poisonedCooldrink" and "Netbus + GalacticHacker(Game)=Contaminated GalacticHacker" well heres another one for you: "An article + utterCrap= an UtterlyCrappyArticle":)