ecrypted trojan

For beginners, flames not allowed...(just by the staff :P)
Post Reply
User avatar
n3rd
Staff Member
Staff Member
Posts: 1474
Joined: 15 Nov 2005, 17:00
15
Location: my own perfect world in ma head :)
Contact:

ecrypted trojan

Post by n3rd »

Hello,

ima NewB :P not a NOob.

this is the situation.

I want to create an ecrypted trojan behind a picture ( Jpeg.)
- trojan is supposed to send data to a email adres.

the data that should be send is a complete list of files that are on the computer.
and ofcourse the trojan should not be visible in the process list.

that is my first step not to hard but some 1 please help me create this :)

second.

once I found the files I want, I need to send another trojan that helps me send the requested file I want.

yet again how to create this.

does some 1 have a good really good site that explains the easy way?
I have seen lots of tutorials wich bigass sucked cause they did not give me the lines I need to create the trojan.

thnx in advanced

N3rd

User avatar
CommonStray
Forum Assassin
Forum Assassin
Posts: 1214
Joined: 20 Aug 2005, 16:00
16

Post by CommonStray »

encrypting something behind a picture? check steganography for that one mate

User avatar
n3rd
Staff Member
Staff Member
Posts: 1474
Joined: 15 Nov 2005, 17:00
15
Location: my own perfect world in ma head :)
Contact:

Post by n3rd »

please explain what U are refering to. post a link if possible.

also I got another question.

is there a site or a text document wich states all binding lines on how to make a procces invisible?

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11608
Joined: 06 Apr 2005, 16:00
16
Location: The zone.
Contact:

Post by bad_brain »

get "www shell" from the trojan-section, it´s a real nice and simple one, written in Python (when I remember it right). you have to compile it by yourself, this gives you the opportunity to configure it for your needs. the trojan can´t be detected by a firewall because it binds to the browser and uses the http-protocol.
it isn´t even recognized by virus scanners (at least not by AVG and Norton, don´t know about other ones), but for hiding it you can use the usual exe-binders... :wink:

User avatar
n3rd
Staff Member
Staff Member
Posts: 1474
Joined: 15 Nov 2005, 17:00
15
Location: my own perfect world in ma head :)
Contact:

Post by n3rd »

k remember I am a complete newb to the compiling thing.

I know what I want for the trojan to do

it is easy and harmless.

now another question I am wandering about is.

what is the best way to get it to my victim?

and does some1 have a encryption file.

since that is needed to put it behind a document or picture.

last but not least. some 1 please give me a Python help me with coding ><

User avatar
Nerdz
The Architect
The Architect
Posts: 1127
Joined: 15 Jun 2005, 16:00
16
Location: #db_error in: select usr.location from sucko_member where usr.id=63;
Contact:

Post by Nerdz »

Come on... to make a trojan you don't have to just type in a .txt like::

1. Don't go in process
2. send me stuff to bla@hotmail.com
3. delete log
4. delete yourself
Give a man a fish, you feed him for one day.
Learn a man to fish, you feed him for life.

User avatar
n3rd
Staff Member
Staff Member
Posts: 1474
Joined: 15 Nov 2005, 17:00
15
Location: my own perfect world in ma head :)
Contact:

Post by n3rd »

see I told U it was simple ><

now the problem is I dont know the codes ><

now how do I get the data I wish to have?

User avatar
Carlos27
Newbie
Newbie
Posts: 2
Joined: 17 Dec 2005, 17:00
15

Not as easy as you think.

Post by Carlos27 »

You are trying to hide the trojan 'server' in a jpg image with the file extention .jpg
I don't think this can be done, but I'm not 100% sure on that.
Seems to me that you are planning to have some fun with the RATS.

You can use an exe binder to bind the trojan server with a .exe file such as a flash game for instance.

To get your victim to infect themselves you will need to get them to play the game.

I'm guessing you just want to send somebody on messenger a .jpg after a bit of social engineering though and target your probably female hosts webcam. :twisted:

You can bind the .exe to a .jpg image and rename the file to be "My Pic.jpg .exe"

This can work but these days is unlikely to be honest.

The best way is to get the victim to view a webpage with a trojan dropper coded into it.

Post Reply