Anti Virus's block everything
Anti Virus's block everything
Antivirus's block every trojan that I've ever tried to use, so can someone answer me please, how your meant to use them? Im not trying to be rude in any way, Im just confused. How are you meant to use a trojan without it being picked up by anti-virus's?
- bad_brain
- Site Owner
- Posts: 11638
- Joined: 06 Apr 2005, 16:00
- 19
- Location: In your eye floaters.
- Contact:
you have to bind the server to another file to camouflage it, and you have to use one which has the ability to disable AV-apps. but this will not work for every antivirus-app, only for the ones which don't have the ability of self-protection. Norton for example has self-protection, but no app is 100% secure, so check for vulnerabilities on the usual websites, some antivirus apps exclude certain file-types or directories from beeing scanned for example (on Norton it was (is?) the "Norton Protected Recycle Bin" as far as I remember).
I know, this trojan stuff is very interesting for beginners, but don't waste too much time with it....
I know, this trojan stuff is very interesting for beginners, but don't waste too much time with it....
Yeah I tried binding aswell, it would still get picked up.
Is it that the trojan I tried to use is specifically known by the antivirus and 'black-listed', or is it that the trojan gets picked up because of the suspicious way in which its written. Im just curious because I've read that you can buy trojans that will go undetected and wondering how theyre any differant.
Is it that the trojan I tried to use is specifically known by the antivirus and 'black-listed', or is it that the trojan gets picked up because of the suspicious way in which its written. Im just curious because I've read that you can buy trojans that will go undetected and wondering how theyre any differant.
fingerprints and signatures
Think of a virus 'signature' as a fingerprint.
The antivirus app compares the file's code to this fingerprint, the fingerprint is kept in a database of known suspects. If the file's code is a match or even close to a suspect fingerprint, it is red flagged.
Suspects evade detection because they don't have a fingerprint in the database yet, or it's print was modified enough to not be a match to a known fingerprint.
The otherway to evade detection is to not get scanned, i.e. prevent the antivirus app from working!
The antivirus app compares the file's code to this fingerprint, the fingerprint is kept in a database of known suspects. If the file's code is a match or even close to a suspect fingerprint, it is red flagged.
Suspects evade detection because they don't have a fingerprint in the database yet, or it's print was modified enough to not be a match to a known fingerprint.
The otherway to evade detection is to not get scanned, i.e. prevent the antivirus app from working!
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
ohh okay. So this means if you made your own trojan things would be all sweet then - Not that I would try because I'm much too lazy, but thanks for clearing all that up for me. Say, are there open source trojans you can get somewhere to look at and see how they are coded, just to give an idea of how it is done. If not it doesn't matter, but just wondering.