Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

I was watching firewall...


ghost's Avatar
0 0

…and he was typing an email and then the person who hacked his comp deleted the email and typed "i thought we had a deal" onto his screen. is that stuff possible? only id really like to try it out from my comp to my bros comp. ccan someone tell me what i would need to get proper access to my bros comp?


Mr_Cheese's Avatar
0 1

program your own trojan and install it on his, then you can do whatever you want and program what ever features you want.


ghost's Avatar
0 0

wow thats really cool. i have so much to learn tough. so, how does the trojan work? like what does it do that allows me to inerfere with his comp?


AldarHawk's Avatar
The Manager
0 0

in self made Trojans what I like is to add a few small features…

  • Chat hosting (So you can talk to the guy and not screw him up :P)
  • Keyboard Disable (When you want to STOP him from typing ;) )
  • Screen Flip (Fun if they are in the same room as you to watch their reaction)
  • CD-ROM eject (Coke Tray anyone?)
  • Keystroke Logger (get his valuable information :P)
  • Timed Shutdown (Enough Said)
  • Mouse Freeze (fun to do incrementally)
  • Screen Capture Display (Fun for scaring people when computer stops working)
  • The list goes on :P

ghost's Avatar
0 0

Maybe a add a file browser ?B)


ghost's Avatar
0 0

wow guys that sounds really cool. okay, so what languages can you program a trojan in? are they easily made in comparison with other things such as brute force logins etc?

thanks for the info guys, i think its really interesting…


ghost's Avatar
0 0

C/C++ Pascal / TurboPascal Purebasic VB / VB.Net / and such PHP (If you want more infos, just ask !)


ghost's Avatar
0 0

Im guessing to write one in c (the only language of those listed). Im guessing i have to learn how to open ports? actually, ddoes anyone have a check list of what i should learn so that i am able to make my own trojan.


ghost's Avatar
0 0

hi

it's an interesting project and you'll learn a lot

you should first decide what language you will use.

then maybe head to sourceforge or something similar and look for open source programs that have similar functions

a search for trojan on sourceforge doesn't give much… mostly ati trojan stuff

it has however this http://sourceforge.net/projects/kagee it looks cool. but i didn't read the whole thing. but it's in delphi

so it's probably a nice start… use other keywords like remote assisting and stuff like that


ghost's Avatar
0 0

hi

it's an interesting project and you'll learn a lot

you should first decide what language you will use.

then maybe head to sourceforge or something similar and look for open source programs that have similar functions

a search for trojan on sourceforge doesn't give much… mostly ati trojan stuff

it has however this http://sourceforge.net/projects/kagee it looks cool. but i didn't read the whole thing. but it's in delphi

so it's probably a nice start… use other keywords like remote assisting and stuff like that


ghost's Avatar
0 0

Actually I dont know if anyone mentioned it but I cant be arsed reading it.. if it was a unix based system there is the "write" command which lets you write to other people but i doubt it was a command line huh?


ghost's Avatar
0 0

no this guy had his email cluient opened. he was going to email his friend for help. but the terrorist guy had one of his minions hack into his account, delete what he was typing, and then type a message onto his screen. god i love hacking…


ghost's Avatar
0 0

ahh, Firewall the movie, great movie…

yes, for that, you could find a way to install a VNC server on his computer through a trojan

( http://www.realvnc.com get source code, and mod it to be more stealthy and installable by the trojan dropper )


ghost's Avatar
0 0

No offence taken man. Well, i went through the javascript missions pretty quickly. Steganos, had a few tough ones as did the basics. I just read articles (great authors btw :) ) to get me through the missions. You see, i really know very little about accessing pc's remotely. Im usually dont want to ask, because i dont want to come across as a skiddie, but then again, i really wanna know.


ghost's Avatar
0 0

Dark Dragon wrote: mod it to be more stealthy

how do you do this? anyone know of any articles or willing to teach?


ghost's Avatar
0 0

look up making it:

-not show up in task bar -not show up in the icon taskbar (sysbar?) (this should bw done through removing the code) -not showing up in Task Manager -neaver showing up on screen (i dont think it does anyway, i use it unmoded to access a few systems without monitors)


ghost's Avatar
0 0

dumb question… but how can i (or anyone else) put this trojan on someone else's machine?.. especially if he has a firewal/antivirus.. ( yea im a noob :P)


ghost's Avatar
0 0

Ok, well a trojan usually consists of two or three parts, a server, and a client.. the third part can be the editor (which u usually get wen u download a troajn..) but suppose u coded your own, you would need a server and a client.. lets talk about the server.

[Server]

a servers job is to listen for connections on any port of your choosing, say the server was programmed to listen on port 666. Hopefully you know that a server is an executable file.. well there are numerous ways to "infect" a machine.. you can email it, or bind it to any other program, you can use S.E to convince the victim to open the file, thats the main goal.. when the server is ran on the victim machine, it will listen for connections on that port we specified, well suppose they had a firewall.. ofcourse, the firewall is going to detect the file and say something like… "server.exe is attemtpting to listen on port 666 from ip blah blah to remote host blah blah.." who knows.. but it will give the usr the option to allow this or block this… id say most ppl that are not very well imformed would allow this to happen.. well now, the machine is infected.. the server is listening, and the attacker needs to get ahold of the IP address of the infected machine.. heres where the client comes in..

[Client]

This is the second part that would allow for the attacker to connect to the server across the net through the port specified.. from here, depending on the client and server, an attacker can send commands to the server that would be executed on the remote host.. for instance, keyloger, screen capture, file manager.. etc.. this subject can go on and on because there is so much information and so much to it..

[Conclusion]

Finally, id like to say that programming a trojan might not be all that hard, but the knowledge of a language might be.. umm ive programmed a small trojan on VB6, it wasnt the best, but it worked well.. thats a very easy language to learn, but i recommend C/C++.

Hope this helped..


NetDevIL;)


ghost's Avatar
0 0

Ok, well a trojan usually consists of two or three parts, a server, and a client.. the third part can be the editor (which u usually get wen u download a troajn..) but suppose u coded your own, you would need a server and a client.. lets talk about the server.

[Server]

a servers job is to listen for connections on any port of your choosing, say the server was programmed to listen on port 666. Hopefully you know that a server is an executable file.. well there are numerous ways to "infect" a machine.. you can email it, or bind it to any other program, you can use S.E to convince the victim to open the file, thats the main goal.. when the server is ran on the victim machine, it will listen for connections on that port we specified, well suppose they had a firewall.. ofcourse, the firewall is going to detect the file and say something like… "server.exe is attemtpting to listen on port 666 from ip blah blah to remote host blah blah.." who knows.. but it will give the usr the option to allow this or block this… id say most ppl that are not very well imformed would allow this to happen.. well now, the machine is infected.. the server is listening, and the attacker needs to get ahold of the IP address of the infected machine.. heres where the client comes in..

[Client]

This is the second part that would allow for the attacker to connect to the server across the net through the port specified.. from here, depending on the client and server, an attacker can send commands to the server that would be executed on the remote host.. for instance, keyloger, screen capture, file manager.. etc.. this subject can go on and on because there is so much information and so much to it..

[Conclusion]

Finally, id like to say that programming a trojan might not be all that hard, but the knowledge of a language might be.. umm ive programmed a small trojan on VB6, it wasnt the best, but it worked well.. thats a very easy language to learn, but i recommend C/C++.

Hope this helped..


NetDevIL;)


ghost's Avatar
0 0

Rebirth wrote: trojans aren't that difficult to program in VB (and it is even possible to program a fully functional one in PHP). I program those things all the time, they are quite fun. I have heard though that delphi was the premire choice in trojan making (although that is probably due to the fact that sub7 is programed in Delphi).

perhaps your right, although i have to agree, it is quite easy, specially in VB, ive always wanted to try DElphi, but i never really got the hang of the language, looks simple, but i havnt really looked into it much..


ghost's Avatar
0 0

gee, this thread turned out much better than i expected! once again, thankyou all for your input! okay, so does anyone know of any tutorials on creating a trojan? when people say coded in vb, did they just use excel's vb capabilities, or microsoft visual basic studio?

thanks for all your help!


ghost's Avatar
0 0

Um okay, i was playing about with microsoft excels vb editor, and when i add winsock, nothing seems to happen? i have added it from the components box, and dragged it onto the form, but nothing happens. What do i need to do? should i be using a different vb editor?


ghost's Avatar
0 0

Also, the winsock component is not listed when i go to add a reference to it…


ghost's Avatar
0 0

they meant vbstudio and not exell and you should edit your messages instead of posting multiple


ghost's Avatar
0 0

sorry about that

okay, is vbstudio free? i downloaded visula basic 2005 express, but i dont think its the right app…


ghost's Avatar
0 0

if your brother is on your network then you can download a network remote… it will only work if he is on your network, but most are easy to use. basicly, they open another window in your computer with his desktop in it so when you go into that window you can contorl his computer as if you were at his own key board.


ghost's Avatar
0 0

bigggnick wrote: if your brother is on your network then you can download a network remote… it will only work if he is on your network, but most are easy to use. basicly, they open another window in your computer with his desktop in it so when you go into that window you can contorl his computer as if you were at his own key board.

Like the realVNC server and the VNCon client. I use those 2 to really piss my sister off.


ghost's Avatar
0 0

A trojan does NOT usually have a client and a server. By definition, a trojan is any form of virus in the broadest sense that pretends to be something it's not in order to gain computer access. Trojans CAN have a client/server pair, but that in general is called a Remote Admin Tool.


ghost's Avatar
0 0

Going back to what biggnick was saying, I was wondering it is possible to use that program to mess with people on a network you've hijacked,by say standing outside their house with your laptop.If i didn't explain this well let me know and i'll repost:)