How to use trojan?
How to use trojan?
Hey, i'd like to know how to use trojans, im interested in sub7 now. How can i send the server file to the victim? If i know his ip how can i send it?
Sorry, this is a newb question, but...
Sorry, this is a newb question, but...
- bad_brain
- Site Owner
- Posts: 11638
- Joined: 06 Apr 2005, 16:00
- 19
- Location: In your eye floaters.
- Contact:
well, newbie questions are np, but the question has been answered already before in other threads...
but well, here we go:
you can´t send the server to the target just by knowing the IP, you have to use an email for it or a file transfer through an IM for example. the victim has to open the file to install the server on his box, so his have to camouflage the file to evade detection by a virus scanner and to distract the victim, use a binder for this...
but well, here we go:
you can´t send the server to the target just by knowing the IP, you have to use an email for it or a file transfer through an IM for example. the victim has to open the file to install the server on his box, so his have to camouflage the file to evade detection by a virus scanner and to distract the victim, use a binder for this...
- campinkarl
- Newbie
- Posts: 7
- Joined: 04 Jan 2006, 17:00
- 18
- CommonStray
- Forum Assassin
- Posts: 1216
- Joined: 20 Aug 2005, 16:00
- 19
- campinkarl
- Newbie
- Posts: 7
- Joined: 04 Jan 2006, 17:00
- 18
- Floodhound
- forum buddy
- Posts: 11
- Joined: 26 Feb 2006, 17:00
- 18
- Contact:
I have personally made several Trojans AKA server/client platforms and would be interested in teaching if you like. The construction of a Trojan is very fun and if you learn to program it can be specifically tailored to your needs. Just ask and I can teach or point you in the right direction. I like using Visual Basic for puters with Windows or C for that matter. I also like to construct my own Binders so that the diction is limited by Anti-V software.
- whitepower-holland-3
- Newbie
- Posts: 2
- Joined: 24 Feb 2006, 17:00
- 18
- Merchant
- suck-o-fied!
- Posts: 70
- Joined: 30 Oct 2005, 17:00
- 19
- Location: In the shadows of your mind...
- Contact:
hey, id be interested. ive been looking into it, it might be nice to have someone who i can ask questions. would you be willing to help me?>Floodhound wrote:I have personally made several Trojans AKA server/client platforms and would be interested in teaching if you like. The construction of a Trojan is very fun and if you learn to program it can be specifically tailored to your needs. Just ask and I can teach or point you in the right direction. I like using Visual Basic for puters with Windows or C for that matter. I also like to construct my own Binders so that the diction is limited by Anti-V software.
Merchant
[color=red]Kill me bloody before you die.[/color]
- LaBlueGirl
- Suckopithicus chickasaurus
- Posts: 513
- Joined: 22 Mar 2006, 17:00
- 18
- Location: Brussel
- Contact:
CircuitB0mB wrote:hmm im not sure f Steganography could change this, i dont think it would because it would then be encrypted hence you would need to un-encrypt it
Ok, I know this is old buuut
Steganography wouldn't work, asaik b/c of the reason you stated, basically.
You could put the virus in a picture with an executable component so when they click on it, voilà.
"Hey, Crash!
Ever tried walking with no legs?
It's real slow!"
~Crunch, Crash Bandicoot TTR
Ever tried walking with no legs?
It's real slow!"
~Crunch, Crash Bandicoot TTR