Need help w/ Backdoor/RAT/Trojan.

No explicit questions like "how do I hack xxx.com" please!

Do you believe that RAT is the best trojan?

Yes
0
No votes
No
2
20%
I don't know
4
40%
Maybe
2
20%
I don't care
2
20%
 
Total votes: 10

User avatar
Lyecdevf
cyber Idi Amin
cyber Idi Amin
Posts: 1222
Joined: 16 Mar 2006, 17:00
18
Location: In between life and death.
Contact:

Post by Lyecdevf »

Binders join randomly so you never get same result twice. So what you would do is to try joining the two programs over and over again until you get the result you desire. Some times all of the AV's are going to pick it up and other times none might and that is when you hit the jackpot.

That is what I think you shoud do now instead of joining 10 progs. All you need is a backdoor and if you can conect to that computer you can install other stuff. Besides that if you bind more than one spyware or malware there is more possibility that it is going to be picked up by AV.
We will either find a way, or make one.
- Hannibal

User avatar
Losing_grip
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 485
Joined: 22 Apr 2007, 16:00
16
Location: Behind Socks5

Post by Losing_grip »

Lyecdevf wrote:Binders join randomly so you never get same result twice. So what you would do is to try joining the two programs over and over again until you get the result you desire. Some times all of the AV's are going to pick it up and other times none might and that is when you hit the jackpot.

That is what I think you shoud do now instead of joining 10 progs. All you need is a backdoor and if you can conect to that computer you can install other stuff. Besides that if you bind more than one spyware or malware there is more possibility that it is going to be picked up by AV.

Sad to say , but i do not have physical access to their computer , and backdoors are easy to detect. I was wondering about rootkit , where can i find rootkit programs? Thanks for the reply.


Sincerely
Losing_grip

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
18
Location: In your eye floaters.
Contact:

Post by bad_brain »

you can find rootkits in our downloads or on http://www.rootkit.com :wink:

User avatar
Losing_grip
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 485
Joined: 22 Apr 2007, 16:00
16
Location: Behind Socks5

Post by Losing_grip »

bad_brain wrote:you can find rootkits in our downloads or on http://www.rootkit.com :wink:
Thanks , uhmm... do you know the Trojan downloader? the one which is small as 2kb and can bind with any file and after they execute the file that small trojan downloader would go to the website i specify then download and run the program silently , Uhmm.. Do you know a program which can make downloader or something? Thanks.

User avatar
Lyecdevf
cyber Idi Amin
cyber Idi Amin
Posts: 1222
Joined: 16 Mar 2006, 17:00
18
Location: In between life and death.
Contact:

Post by Lyecdevf »

We will either find a way, or make one.
- Hannibal

User avatar
Losing_grip
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 485
Joined: 22 Apr 2007, 16:00
16
Location: Behind Socks5

Post by Losing_grip »

Lyecdevf wrote:I tried google and I found this:

http://www.viruslist.com/en/virusesdesc ... =153318100
Hey , thanks a lot! this site really helped.


Sincerely
Losing_grip

User avatar
Losing_grip
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 485
Joined: 22 Apr 2007, 16:00
16
Location: Behind Socks5

Post by Losing_grip »

Uhmm.. just wanna know , what can i do if i have someone IP?
can i use port scanner and how can i break in into their system and install trojan? and does any1 here know a person who find string/sig to make my trojan undetected? btw , where do usually script kiddie hang around? IRC right? how to have communicate with 'em? Thanks.

User avatar
Losing_grip
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 485
Joined: 22 Apr 2007, 16:00
16
Location: Behind Socks5

Post by Losing_grip »

Uhmm lately , i found out that script kiddie can attack too , not by just sending a file to someone but by using these methods...

A Day in the Life of a Script Kiddie:

* Pick a host.
* Scan all common ports
* Do a banner check on open ports.
* Look for a match in you remote exploits database.
* Apply exploit.
* If not already root, find all suid programs.
o Look for a match in your local exploits database.
o Apply exploit.
* Install rootkit.
* Sanitize logs (this may or may not have already been done by the rootkit.)
* Install a backdoor or two.

* Then sit back and marvel at your "skill" at 0wning a box.
* Followed by, install a DDOS bot.
* Repeat x thousand times.
* DDoS the hell out of anything and everything that catches your attention.
* Or alternatively, setup ftp and use the box as a warez dump for all your fellow kiddiez.



Now im becoming more and more interesting to "script kiddies"
O_O!!!! so help me god :twisted:

Post Reply