Some method to send certain victim trojan?
Some method to send certain victim trojan?
Can some1 help me, i tried my all methods but no success?
Volim ovu igru nema nista draze i evo tu da me seces ako te ista lazem.
I love this game and there's nothing to compare.
I love this game and there's nothing to compare.
Well, not that I am any specialist on the subject, but trying to "hide" and execute an executable in a text file is a bit tricky. If the user is a bit careless, it can be simple enough, but the whole thing can be easily intercepted by an updated antivirus program and a firewall. One trick is to try and make the executable look like a text tile, aka change the icon to that of a .txt file, change the name to name.txt (actual name is name.txt.exe) and pray that the firewall / antivirus isn't activated at the time. Another one is to try and hide it in a game, so that it can have administrator privileges without much suspicion (people tend to let games pass through everything, even antiviruses, given that most games out there are cracked). But be warned, that these methods are easily intercepted, if the user is a bit experienced or careful.
A general hint: Use common sense.
A general hint: Use common sense.
George T. I.
@GeorgeTI:
But seriously though, your game idea is pretty good. Personally I find writing a small program that just unpacks and runs the trojan and pops up a little GUI form that doesn't do anything other than look convincing, and naming it RAPIDSHARE_unlimited.exe or some other such nonsense is almost universally successful to the casual user. Worst case scenario you target knows you personally and discovers the virus, which you can deal with via the "shit really? thanks for telling me, goddamn it i'm gonna have to clean out my drive now" defense.
That said, infecting people with trojans is really lame, so don't do it unless you have a very specific and good reason. If it's a prank he won't find it funny, and if it's to show off to other people, it won't impress them. Also, make sure you clean up after yourself when you're done - once you got what you came for, remove the trojan. No, putting a password on the trojan is not good enough. If you leave his computer open to the internet for any longer than absolutely necessary, you're a huge asshole.
Code: Select all
#DEFINE ALL_METHODS 1
That said, infecting people with trojans is really lame, so don't do it unless you have a very specific and good reason. If it's a prank he won't find it funny, and if it's to show off to other people, it won't impress them. Also, make sure you clean up after yourself when you're done - once you got what you came for, remove the trojan. No, putting a password on the trojan is not good enough. If you leave his computer open to the internet for any longer than absolutely necessary, you're a huge asshole.
If you would be unloved and forgotten, be reasonable.
I don't understand the point in this thread. Obviously you haven't written this trojan by yourself or you would of been able to mask it as something else in the coding.
The whole "system" is a number of people creating a code all together, this code loops and is there for a "system".
System Zero could also be confirmed with one word "Hacker's"
System Zero could also be confirmed with one word "Hacker's"
Off topic, but browsing through Liidian's post history:
- Liidian does not know what a command prompt is (2011-09-24)
- Liidian likes to hack by "modefying their settings by a program" (2011-05-09)
- Liidian thinks it is impossible to connect to a computer without first infecting it (2011-05-06)
- Liidian thinks of herself as an experienced hacker, and recommends not hacking (2011-01-08)
- Liidian does not know how to hack (2010-05-28)
- Liidian uses hotmail (2010-03-31)
- Liidian thinks CodeX is a script kiddie (2010-02-24)
- Liidian thinks ARP stands for Armor Protection (2010-02-24)
I think we're getting far enough into the past that these are becoming irrelevant. After all, when you're 14, a year and a half is like a quarter of your life, right? I dunno i suck at math what is this I dont even.
- Liidian comes up with a cunning retort, probably something to do with the way I misspelled his/her username at some point in my post (tomorrow)
- Liidian does not know what a command prompt is (2011-09-24)
- Liidian likes to hack by "modefying their settings by a program" (2011-05-09)
- Liidian thinks it is impossible to connect to a computer without first infecting it (2011-05-06)
- Liidian thinks of herself as an experienced hacker, and recommends not hacking (2011-01-08)
- Liidian does not know how to hack (2010-05-28)
- Liidian uses hotmail (2010-03-31)
- Liidian thinks CodeX is a script kiddie (2010-02-24)
- Liidian thinks ARP stands for Armor Protection (2010-02-24)
I think we're getting far enough into the past that these are becoming irrelevant. After all, when you're 14, a year and a half is like a quarter of your life, right? I dunno i suck at math what is this I dont even.
- Liidian comes up with a cunning retort, probably something to do with the way I misspelled his/her username at some point in my post (tomorrow)
If you would be unloved and forgotten, be reasonable.
malachi, have you considered a multiple personality or multiple users on the account?
Also,. if you haven't written the trojan yourself doesn't mean that you can't edit it or use it as it is (a well written trojan on a suitable computer aka with a not-too-knowledgeable and/or without firewall / antivirus - believe me there are a LOT of such boxes out there). Writing the trojan means that you have understood what it does first, and that's all it takes to edit an existing one without much fuss.
Also,. if you haven't written the trojan yourself doesn't mean that you can't edit it or use it as it is (a well written trojan on a suitable computer aka with a not-too-knowledgeable and/or without firewall / antivirus - believe me there are a LOT of such boxes out there). Writing the trojan means that you have understood what it does first, and that's all it takes to edit an existing one without much fuss.
George T. I.
- Liidian does know what command prompt is and what it does, he simply is trying not to state anything since the overaggressive codex is always around the corner.malachi wrote:Off topic, but browsing through Liidian's post history:
- Liidian does not know what a command prompt is (2011-09-24)
- Liidian likes to hack by "modefying their settings by a program" (2011-05-09)
- Liidian thinks it is impossible to connect to a computer without first infecting it (2011-05-06)
- Liidian thinks of herself as an experienced hacker, and recommends not hacking (2011-01-08)
- Liidian does not know how to hack (2010-05-28)
- Liidian uses hotmail (2010-03-31)
- Liidian thinks CodeX is a script kiddie (2010-02-24)
- Liidian thinks ARP stands for Armor Protection (2010-02-24)
-You cannot connect to another persons computer going through firewalls without infecting their computer at first, it is possible to connect to the same LAN network or WAN by knowing the password though.
- Liidian has been mixturing with computers since he was 12, he never claimed to be an experienced hacker and he does indeed think hacking is in most cases unnecessary or stupid.
-You can't describe something as "does not know how to hack", because try defying hacking.
-Liidian does indeed have at least 2 hotmail adresses, some gmails and outlook.
-Liidian does not think CodeX is a script kiddie but does agree that CodeX is a skilled computer engineer, Liidian does simply not like the persona of CodeX.
- Liidian said armor penentration for first mention and secondly liidian does still not know what ARP is.
So stop big mouthing cool boy, im not 14 or whatever. That time has passed. You can mouth me all you want but you have no actual fact of anything and my opinion is correct. If you did not write the trojan yourself of course masking would become a problem. You're simply to stupid or unintelligent to understand therefore i called you a retard, understand now kiddo?
The whole "system" is a number of people creating a code all together, this code loops and is there for a "system".
System Zero could also be confirmed with one word "Hacker's"
System Zero could also be confirmed with one word "Hacker's"
OK now, flames set aside:
I am not that sure about this, I mean the switches and routers still can be buggy, not updated or with weak / no passwords. Also, infecting the computer doesn't mean 100% success; a well-configured firewall will intercept the outgoing connections as well. All in all, even infecting can be from ineffective to even not necessary.Liidian wrote: -You cannot connect to another persons computer going through firewalls without infecting their computer at first, it is possible to connect to the same LAN network or WAN by knowing the password though.
Hacking is in most cases essential, as long as it remains white-hat. The ones who publish the exploits are mostly hackers, think about what would happen if none of honest intentions actually hacked? If only black-hats hacked, there would be just chaos, and yes, such people usually have nothing better to doLiidian wrote: - Liidian has been mixturing with computers since he was 12, he never claimed to be an experienced hacker and he does indeed think hacking is in most cases unnecessary or stupid.
If you google it, you can see that ARP stands for Adress Resolution Protocol, quite simple, really -.-"Liidian wrote: - Liidian said armor penentration for first mention and secondly liidian does still not know what ARP is.
George T. I.
Liidian, you do realize that you are in fact connecting to a computer every time you browse a webpage, send an email, etc? You know when your browser says "Connecting to [...]"? Believe it or not, it is in fact connecting to something.
I'm not gonna bother with the rest.
I'm not gonna bother with the rest.
If you would be unloved and forgotten, be reasonable.