I was watching firewall...
…and he was typing an email and then the person who hacked his comp deleted the email and typed "i thought we had a deal" onto his screen. is that stuff possible? only id really like to try it out from my comp to my bros comp. ccan someone tell me what i would need to get proper access to my bros comp?
in self made Trojans what I like is to add a few small features…
- Chat hosting (So you can talk to the guy and not screw him up :P)
- Keyboard Disable (When you want to STOP him from typing ;) )
- Screen Flip (Fun if they are in the same room as you to watch their reaction)
- CD-ROM eject (Coke Tray anyone?)
- Keystroke Logger (get his valuable information :P)
- Timed Shutdown (Enough Said)
- Mouse Freeze (fun to do incrementally)
- Screen Capture Display (Fun for scaring people when computer stops working)
- The list goes on :P
hi
it's an interesting project and you'll learn a lot
you should first decide what language you will use.
then maybe head to sourceforge or something similar and look for open source programs that have similar functions
a search for trojan on sourceforge doesn't give much… mostly ati trojan stuff
it has however this http://sourceforge.net/projects/kagee it looks cool. but i didn't read the whole thing. but it's in delphi
so it's probably a nice start… use other keywords like remote assisting and stuff like that
hi
it's an interesting project and you'll learn a lot
you should first decide what language you will use.
then maybe head to sourceforge or something similar and look for open source programs that have similar functions
a search for trojan on sourceforge doesn't give much… mostly ati trojan stuff
it has however this http://sourceforge.net/projects/kagee it looks cool. but i didn't read the whole thing. but it's in delphi
so it's probably a nice start… use other keywords like remote assisting and stuff like that
ahh, Firewall the movie, great movie…
yes, for that, you could find a way to install a VNC server on his computer through a trojan
( http://www.realvnc.com get source code, and mod it to be more stealthy and installable by the trojan dropper )
No offence taken man. Well, i went through the javascript missions pretty quickly. Steganos, had a few tough ones as did the basics. I just read articles (great authors btw :) ) to get me through the missions. You see, i really know very little about accessing pc's remotely. Im usually dont want to ask, because i dont want to come across as a skiddie, but then again, i really wanna know.
Ok, well a trojan usually consists of two or three parts, a server, and a client.. the third part can be the editor (which u usually get wen u download a troajn..) but suppose u coded your own, you would need a server and a client.. lets talk about the server.
[Server]
a servers job is to listen for connections on any port of your choosing, say the server was programmed to listen on port 666. Hopefully you know that a server is an executable file.. well there are numerous ways to "infect" a machine.. you can email it, or bind it to any other program, you can use S.E to convince the victim to open the file, thats the main goal.. when the server is ran on the victim machine, it will listen for connections on that port we specified, well suppose they had a firewall.. ofcourse, the firewall is going to detect the file and say something like… "server.exe is attemtpting to listen on port 666 from ip blah blah to remote host blah blah.." who knows.. but it will give the usr the option to allow this or block this… id say most ppl that are not very well imformed would allow this to happen.. well now, the machine is infected.. the server is listening, and the attacker needs to get ahold of the IP address of the infected machine.. heres where the client comes in..
[Client]
This is the second part that would allow for the attacker to connect to the server across the net through the port specified.. from here, depending on the client and server, an attacker can send commands to the server that would be executed on the remote host.. for instance, keyloger, screen capture, file manager.. etc.. this subject can go on and on because there is so much information and so much to it..
[Conclusion]
Finally, id like to say that programming a trojan might not be all that hard, but the knowledge of a language might be.. umm ive programmed a small trojan on VB6, it wasnt the best, but it worked well.. thats a very easy language to learn, but i recommend C/C++.
Hope this helped..
NetDevIL;)
Ok, well a trojan usually consists of two or three parts, a server, and a client.. the third part can be the editor (which u usually get wen u download a troajn..) but suppose u coded your own, you would need a server and a client.. lets talk about the server.
[Server]
a servers job is to listen for connections on any port of your choosing, say the server was programmed to listen on port 666. Hopefully you know that a server is an executable file.. well there are numerous ways to "infect" a machine.. you can email it, or bind it to any other program, you can use S.E to convince the victim to open the file, thats the main goal.. when the server is ran on the victim machine, it will listen for connections on that port we specified, well suppose they had a firewall.. ofcourse, the firewall is going to detect the file and say something like… "server.exe is attemtpting to listen on port 666 from ip blah blah to remote host blah blah.." who knows.. but it will give the usr the option to allow this or block this… id say most ppl that are not very well imformed would allow this to happen.. well now, the machine is infected.. the server is listening, and the attacker needs to get ahold of the IP address of the infected machine.. heres where the client comes in..
[Client]
This is the second part that would allow for the attacker to connect to the server across the net through the port specified.. from here, depending on the client and server, an attacker can send commands to the server that would be executed on the remote host.. for instance, keyloger, screen capture, file manager.. etc.. this subject can go on and on because there is so much information and so much to it..
[Conclusion]
Finally, id like to say that programming a trojan might not be all that hard, but the knowledge of a language might be.. umm ive programmed a small trojan on VB6, it wasnt the best, but it worked well.. thats a very easy language to learn, but i recommend C/C++.
Hope this helped..
NetDevIL;)
Rebirth wrote: trojans aren't that difficult to program in VB (and it is even possible to program a fully functional one in PHP). I program those things all the time, they are quite fun. I have heard though that delphi was the premire choice in trojan making (although that is probably due to the fact that sub7 is programed in Delphi).
perhaps your right, although i have to agree, it is quite easy, specially in VB, ive always wanted to try DElphi, but i never really got the hang of the language, looks simple, but i havnt really looked into it much..
if your brother is on your network then you can download a network remote… it will only work if he is on your network, but most are easy to use. basicly, they open another window in your computer with his desktop in it so when you go into that window you can contorl his computer as if you were at his own key board.
bigggnick wrote: if your brother is on your network then you can download a network remote… it will only work if he is on your network, but most are easy to use. basicly, they open another window in your computer with his desktop in it so when you go into that window you can contorl his computer as if you were at his own key board.
Like the realVNC server and the VNCon client. I use those 2 to really piss my sister off.